Basic component of Network Management Woraphon Lilakiatsakun.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Chapter 19: Network Management Business Data Communications, 5e.
Network+ Guide to Networks, Fourth Edition
Introduction to Network Analysis and Sniffer Pro
Chapter 19: Network Management Business Data Communications, 4e.
Network Management 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 16, Thursday 4/19/2007)
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Chapter 13 Physical Architecture Layer Design
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Maintaining and Updating Windows Server 2008
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Lecture 11 Intrusion Detection (cont)
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Hands-On Microsoft Windows Server 2008 Chapter 11 Server and Network Monitoring.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Windows Server 2008 Chapter 11 Last Update
HiVision SNMP Software.
Network Topologies.
1/28/2010 Network Plus Unit 5 Section 2 Network Management.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Management Functions and Reference Models W.lilakiatsakun.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Basic Ingredients of Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Basic component of Network Management
Module 7: Fundamentals of Administering Windows Server 2008.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
CS 453 Computer Networks Lecture 22 Network Management.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Chapter 6 – Connectivity Devices
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Basic component of Network Management Woraphon Lilakiatsakun.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Basic component of Network Management Woraphon Lilakiatsakun.
NETWORK CONTROL The Fourth Meeting. 2 Table of Contents  Introduction  Configuration Control  Security Control.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Basic component of Network Management Woraphon Lilakiatsakun.
IT System Administration Lesson 3 Dr Jeffrey A Robinson.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Maintaining and Updating Windows Server 2008 Lesson 8.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART1 Data collection methodology and NM paradigms 1.
SQL Database Management
Chapter 19: Network Management
This presentation is based on the slides listed in references.
Server Upgrade HA/DR Integration
Hands-On Microsoft Windows Server 2008
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
An Introduction to Computer Networking
Data collection methodology and NM paradigms
Software models - Software Architecture Design Patterns
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Basic component of Network Management Woraphon Lilakiatsakun

Basic components Fig 3-1

The Network devices It is also called “Network Element (NE)” NE must offer a management interface to allow managing system to communicate with So, NEs. have to run a process as “Management Agent” Management communication – Manager - a managing application who in charge of the management – (Management) Agent – support the manager by responding to its requests and notifying unexpected events

Manager-agent communication Fig 3-2

Management agent A management interface – handle management communication A Management Information Base (MIB)- conceptual data store (management information) that contain management view of the device being managed The core agent logic – translates between the operation of the management interface, the MIB and the actual device

Management interface The mean to connect to the agent – Hardware Interface : Port, interface card – Software Interface : Management protocol that defines the rules of conversation for communication between the managed network element

Management Information Base (MIB) (1) Management operations are directed against the conceptual view – Ex. The network ports of a NE could be represented as a table in an imaginary database with each port having a corresponding entry in the table MIB is not a real database,it works as a proxy of the NE that affects to the actual device – EX. When MA modifies entry in the conceptual table, the actual configuration of device is also changed MIB does not always have to resemble a conceptual table depending on the management agent – Extended Markup Language (XML) – Set of Command-line parameters

Management Information Base (MIB) (2)

Management Information Base (MIB) (3) MIB related standard RFC 1155 – Structure and Identification of Management Information for TCP/IP based internets RFC 1157 – Simple Network Management Protocol RFC 1213 – Management Information Base for Network Management of TCP/IP-based internets

Management Information Base (MIB) (4) OID = (internet) OID = (dpsAlarmControl) MIB – OID Tree

Core agent logic Translates between the operation of the management interface, MIB, and actual device – Ex. Translate the request to “retrieve a counter” into an internal operation that reads out a device hardware register. Additionally, it can include more management functions (embedded management intelligence) that offload the processing required by management app. – Pre-correlated raw events before sent out – Schedule a periodic test function instead of sending new test request each time.

An anatomy of management agent Fig 3-4

Management information Management information provides an abstraction of the real-world aspects for management purposes – The version of installed software - to decide which devices need to have new software – Utilization of port - whether capacity upgrades are necessary – Packet counter for different interfaces – indicate that a network is under attack (DoS)

Managed Object (1) We refer a chunk of management information that expose of these real-world aspects as a managed object (MO) – A device fan along with its operational state – A port on a line card along with a set of statistical data

Managed Object (2)

Managed Object (3) Not all aspects in the real world are modeled – Color of devices Real world object that MO represents is referred to as the “real resource” Since management information in MIB represents real resource – When querying the MIB for MO representing a packet counter 3 times, the value returned will be different – When modifying information in the MIB to perform certain updates, it will affect the real world.

Basic parts of network management - refined Fig 3-6

The Management System (1) Tools to manage the network – Monitor the network – Service provisioning system – Craft terminal A management system can run one or more hosts – Distributed across several hosts – Scalability – More robust

The Management System (2) Roles in Network Management System – Manager / Agent Sometimes, one network element can play two roles as figure

The Management System (3) Fig 3-8 Manager/agent reference diagram

The Management System (4) Fig 3-9 Caching MIB

The Management System (5) Pros for caching MIB – avoid having to go back to the NE repeatedly for the same information Cons for caching MIB – The cache is stale

The Management Network (1) Networks for carrying traffic of subscriber or end user are referred as “production network” Networks for carrying management traffic are referred as “management network” Both can be physically separate networks or they can share the same physical network

The Management Network (2) Fig 3-12 Dedicated Vs Shared Management and Production networks

The Management Network (3) Connecting a craft terminal to a managed device and use CLI to configure and troubleshoot the network device Simple Management

The Management Network (4) Fig 3-11 Connecting to multiple devices through a terminal server

The Management Network (5) Fig 3-12 Dedicated Vs Shared Management and Production networks

The Management network (6) Pros of a dedicated management network Reliability – Congestion or network failure occurs somewhere in the network, it makes the devices hard to reach Management traffic will be impacted Hard to find out what it is happening

The Management network (7) Pros of a dedicated management network (Con’t) Interference avoidance – Compete with production traffic –data or voice traffic – Not high volume but bursty characteristics may interfere high QoS services (voice,video streaming) Ease of network planning – No need to consider on management traffic Security – Hard to attack and more secure

The Management network (8) Cons of a dedicated management network Cost and overhead – Addition cost for a management network No reasonable alternative – Some devices do not provide a physical connection for another usage – DSL router cannot be connected with two physical links

The Management network (9) Cost is the huge disadvantage So, the management network is needed only critical area – Backbone of service providers or big enterprises Hybrid solution – Generally, it shares over production networks – Only critical segments are used as dedicated networks

The Management Support Organization: (1) In term of Network – Network Operation Center (NOC) Telecommunication service provide refer to management system as Operation Support System The management support Org. is responsible for making sure that the network is being run efficiently and effectively

The Management Support Organization (2) Management tasks (not limited to these) – Monitoring the network for failures – Diagnosing failures and communication outages – Planning and carrying out repairs – Provisioning new services and adding/removing users

The Management Support Organization: (3) Organization structure – Network planning - analyzing network usage and traffic patterns and planning network buildout and service rollout – Network operation - keeping the network running and monitoring the network failures – Network administration – Deploying the network and services on it – Customer (user) management -Interacting with the customers

The Management Support Organization: (4) Administrator Operations – Establishment of process and operational policies, documentation of operational procedures Help management of the network consistent and efficient and facilitates meeting a consistently high standard of operations – Collection of audit trails Automatically logging the activities of operations make it easier to reproduce what happened and recover from situation in which human error

The Management Support Organization: (5) – Network documentation Must be accurate and up-to-date Important for network planning and software upgrades – Reliable backup and restore procedures Bring network back to live again in case of disaster and emergencies – Security emphasis Networks potentially most vulnerable from the inside Limit the damage that can cause by one person