Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
ETSI Workshop on Quality Issues for IP Telephony 8-9 June 1999, Sophia Antipolis, France ETSI PROJECT TIPHON overview of QoS activities ETSI Workshop on.
Chapter 19: Network Management Business Data Communications, 5e.
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
Software Testing and Quality Assurance
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Software Engineering Module 1 -Components Teaching unit 3 – Advanced development Ernesto Damiani Free University of Bozen - Bolzano Lesson 2 – Components.
SE 555 Software Requirements & Specification Requirements Analysis.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Chapter 6 Overview Simple Network Management Protocol
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
© Drexel University Software Engineering Research Group (SERG) 1 Based on the paper by Philippe Kruchten from Rational Software.
Configuration Management With The Internet-Standard Management Framework Jon Saperia Adelaide IETF March 2000.
A Policy-based Approach to Wireless LAN Security Management George Lapiotis, Byungsuk Kim, Subir Das, Farooq Anjum Speaker: George Lapiotis
Smith’s Aerospace © P. Bailey & K. Vander Linden, 2005 Architecture: Component and Deployment Diagrams Patrick Bailey Keith Vander Linden Calvin College.
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
An Introduction to Software Architecture
Communication and Functional Models
Automatic Software Testing Tool for Computer Networks ADD Presentation Dudi Patimer Adi Shachar Yaniv Cohen
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 OPSAWG Agenda Items 7,8, 9 Juergen Quittek, John Parello, Benoit Claise 78th IETF Meeting, Maastricht, Energy Management Framework / Architecture.
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
Grid Resource Allocation and Management (GRAM) Execution management Execution management –Deployment, scheduling and monitoring Community Scheduler Framework.
UML Diagrams: Class Diagrams The Static Analysis Model Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
ES 101. Module 2 IP Addressing & Routing. Last Lecture Wide area networking Definition of “packets”
SWE © Solomon Seifu ELABORATION. SWE © Solomon Seifu Lesson 10 Use Case Design.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
The Static Analysis Model Class Diagrams Prof. Hany H. Ammar, CSEE, WVU, and Dept. of Computer Science, Faculty of Computers and Information, Cairo University.
Design Analysis builds a logical model that delivers the functionality. Design fully specifies how this functionality will be delivered. Design looks from.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
7 Systems Analysis and Design in a Changing World, Fifth Edition.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Policy-Based Management with SNMP and Comparison with COPS-PR Steve Waldbusser 5/16/01.
Jini Architecture Introduction System Overview An Example.
Policy-Based Management MIB Steve Waldbusser Jon Saperia Thippanna Hongal.
August 2003 At A Glance The IRC is a platform independent, extensible, and adaptive framework that provides robust, interactive, and distributed control.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
47th IETF 3/29/00 Information Model for describing network policy and services John Strassner - Cisco Walter Weiss - Lucent Andrea Westerinen - SNIA David.
Policy-Based Management MIB Steve Waldbusser Jon Saperia Thippanna Hongal.
Lec 2: Infrastructure of Network Management Part1 from : Computer Networking: A Top Down Approach 6 th edition – Chapter 9 1 Organized by: Nada Alhirabi.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
© 2002, Cisco Systems, Inc. All rights reserved..
MIDCOM MIB Juergen Quittek, Martin Stiemerling, Pyda Srisuresh 60th IETF meeting, MIDCOM session.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
UML Diagrams: Class Diagrams The Static Analysis Model
SMS module HDL-MGSM.431.
Grid Resource Allocation Agreement Protocol Working Group
Module 8: Securing Network Traffic by Using IPSec and Certificates
TGai Guideline for Submissions to TGai Template Slides
Network Administration CNET-443
Patterns.
Analysis models and design models
An Introduction to Software Architecture
A Component-based Architecture for Mobile Information Access
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chapter 4 Network Management Standards and Models
Chapter 5 SNMP Management
Chapter 4 Network Management Standards and Models
System architecture, Def.
Chapter 5 SNMP Management
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Standards, Models and Language
Presentation transcript:

Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia

Slide 2 2/22/2016 Presentation Goals u Provide a common starting point for our discussions by: –Defining common terms - terms in common with Policy Framework Working Group –Presenting an architectural overview of current work –Describing how the proposed process of policy-based management works with SNMP u Identify areas that need further refinement

Slide 3 2/22/2016 Presentation Outline u Definition of Terms –Policy and Levels of Abstraction –Examples u SNMP Architecture –The basic elements –The Policy MIB Module –Mechanism and Device Specific MIB Modules –Support for access in managed devices at multiple levels of abstraction

Slide 4 2/22/2016 Presentation Outline - Continued u Process of Configuration Management with a policy- enabled framework based on SNMP –User definition of policy –Initialization of policy components in managed devices –Configuration of the mechanism specific sub system –Manager interaction with managed devices to learn capabilities –Definition of roles –Policy transfer to managed devices –Device evaluation of policy –Mechanism/Device specific policy module interactions –Device feedback to policy management applications

Slide 5 2/22/2016 Policy Definition u Policy means many things to different people - different levels of abstraction –The high-level -the business level - few technical details All authorized IP phone calls have to get enough bandwidth for TDM equivalent telephone service –Increasing technical detail down to the most ‘refined’ level - individual parameters for specific instances in specific devices.

Slide 6 2/22/2016 Policy Abstraction - Domains u A general area of technology such as service quality or security. u Example domains –IPSec –Differentiated Services u More than 1 domain may be needed to fully represent business level goals.

Slide 7 2/22/2016 Policy Abstraction - Mechanism dependence/independence u Mechanisms are technologies used within a particular domain such as: –RED –WFQ u Policies expressed at a higher levels of abstraction are mechanism independent.

Slide 8 2/22/2016 Policy Abstraction Implementation dependence/independence u Possible to express policy in mechanism dependent and device independent way. u Expect that it will be common to combine mechanism and device dependent layers together. –This is analogous to standard MIB Modules and vendor extensions. Even when the standard is sufficient, many vendors require additional parameters for monitoring and control. –A policy that is defined using RED could have start and stop probabilities defined that have either different queue parameters for different vendors, or other objects that are vendor specific.

Slide 9 2/22/2016 Policy Abstraction - Instance dependence/independence u A policy can be distributed to a managed device in an instance independent or dependent way. u The policy MIB Module is configured with the rules that the managed device use to identify which instances should have the device and mechanism specific policy applied.

Slide 10 2/22/2016 Policy Information at Different Levels of Abstraction

Slide 11 2/22/2016 SNMP Architecture - Basic Elements Managed Elements SNMP Agent The MIB i.e., MIB Modules The SNMP Protocol SNMP Managers with one or more applications

Slide 12 2/22/2016 The Policy MIB Module - Overview u Filters to apply for selection of instances u Role information used in instance selection Ethernet interface Serves the executive offices u Pointers for schedule information u Pointers to mechanism/device dependent MIB Modules

Slide 13 2/22/2016 Policy MIB Module - Overview Continued u Policy state information u Optionally usage information u Device capabilities: –Domains such as quality of service or IPSec –Mechanism appropriate to specific technologies WFQ WRED u Information about which instances are associated with specific roles.

Slide 14 2/22/2016 The Policy Module and other MIB Modules SNMP Agent The MIB Other ‘traditional’ Policy MIB Module Policy Module communicates with other modules as needed or with local instrumentation. device and instance specific MIB Modules

Slide 15 2/22/2016 Mechanism, Implementation and Instance Specific MIB Modules SNMP Agent Policy MIB Module Diff. Serv. Policy MIB Module - converts mechanism and implementation specific information to instance specific level Instance Specific MIB Module(s). Can contain vendor extensions Dotted lines indicate that indicated level of policy information is available to management applications, e.g., all levels are available Solid lines represent possible interactions between components containing different levels of information.

Slide 16 2/22/2016 Table and Information Relationships Role Definitions and filters for each policy Schedule Information Implementation and Mechanism dependent information for each policy Policy Management Application(s) Calendar/Schedule Objects Policy Table (an entry for every policy on the managed element. Role Table - roles are added to instance specific objects (e.g., interfaces) Capabilities Table Mechanism and device specific MIB Modules or tables

Slide 17 2/22/2016 The Entire System - Overview Administratively defined policy Device, Instance and Mechanism Independent ‘default’ information Policy System allows users to create expressions of policy for each domain. Management Application Distributes Policy Information Configuration commands to device, mechanism, and instance specific MIB Module(s) or ‘raw’ device instrumentation Device Dependent, Instance Independent,Mechanism Dependent information Mechanism specific Modules expand, defaults to instances for policy from info from Policy Module Policy MIB Module

Slide 18 2/22/2016 Sequence of Operations u Users provide information to management applications: –Filters/rules that managed elements used to determine which instances to apply specific policies - to pmPolicyFilter. –Schedule information - Policy and Schedule Modules –Device and Mechanism specific information (when needed). –Assignment of roles to instances u Mechanism specific subsystem(s) register with Policy Module. u Managers learn devices capabilities from the Policy Module.

Slide 19 2/22/2016 Sequence of Operations - Continued u Management software sets roleStrings in each device u Management software sends policies to devices –Mechanism and device information sent to devices and appropriate MIB Modules as necessary. u Managed devices evaluate policyFilter and policyAction objects to determine instance targets for policy. u Device/Mechanism dependent modules set necessary values - via communication with other MIB Modules.

Slide 20 2/22/2016 Operations - An Ongoing Activity u Monitor policy status u Monitor resource utilization u Monitor fault status