SlideShare una empresa de Scribd logo
1 de 46
Presented By:
Akhilesh Verma
Roll No-122601
ME (ECE) Regular
SIMPLE NETWORK MANAGEMENT
PROTOCOL
 INTRODUCTION
 CONCEPT
 MANAGEMENT COMPONENTS
• SMI
• MIB
 SNMP
 MESSAGES
 UDP PORTS
 APPLICATIONS
 ADVANTAGES
 REFERENCES
September 4, 2013 2
CONTENTS
 The Simple Network Management Protocol
(SNMP) is an application layer protocol used to
manage network resources. This standardization
gives network administrators the ability to
monitor network performance.
 Defines the format of packets exchanged between
a manager and an agent.
 It reads and changes the status (values) of
objects(variables) in SNMP packets.
September 4, 2013 3
INTRODUCTION
September 4, 2013 4
CONCEPT
AGENT
AGENT
VARIABLES
 Here is a very simplified picture.
 Network manager contact to the agent through
TCP/IP protocol.
 The agent resides in the managed devices and this
agent have some agent variables which should be
available to this manger for monitoring.
September 4, 2013 5
CONCEPT
 AGENT:
• A router or host that runs the SNMP server
program.
• Keep the performance information in a data base.
• Can send a trap to the manager if something
unusual occurs.
September 4, 2013 6
CONCEPT
 MANAGER:
• A host that runs the SNMP client program.
• Has access to values in the agent database.
September 4, 2013 7
CONCEPT
 A manager checks an agent by requesting
information that reflects the behaviour of the
agent.
 A manager forces an agent to perform a task by
resetting values in the agent database.
 An agent contributes to the management process
by warning the manager of an unusual situation
September 4, 2013 8
CONCEPT
MANAGEMENT COMPONENTS
September 4, 2013 9
 Management
September 4, 2013 10
MANAGEMENT COMPONENTS
SNMP
SMI MIB
 This is the actual SNMP protocol itself.
 It defines how information is exchanged between
SNMP agents and network management stations.
 The SNMP protocol operations define the various
SNMP messages and how they are created and
used.
September 4, 2013 11
SNMP
 SNMP transport mappings describe how SNMP
can be used over various underlying internetworks
such as TCP/IP,IPX and others.
 It simply an application program that has a client
on the manager and a server on the agent.
September 4, 2013 12
SNMP
STRUCTURE OF MANAGEMENT INFORMATION
September 4, 2013 13
 SMI defines the general rules for naming objects,
defining object type (including range and length),
showing how to encode object and values.
 SMI does not define the number of objects, an
entity should manage or name the objects to be
managed or define the association between the
objects and their values.
September 4, 2013 14
SMI
 To name objects.
 To define the type of data that can be stored in the
object.
 To show how to encode the data for transmission.
September 4, 2013 15
SMI FUNCTION
MANAGEMENT INFORMATION BASES
September 4, 2013 16
 Creates a collection of named objects, their types,
and their relationships to each other in an entity to
be managed.
September 4, 2013 17
MIB
September 4, 2013 18
OBJECT ATTRIBUTES
September 4, 2013 19
OBJECT IDENTIFIER
 All objects managed by SNMP are given an object
identifier.
 The object identifier always starts with 1.3.6.1.2.1.
September 4, 2013 20
OBJECT IDENTIFIER
September 4, 2013 21
DATA TYPE
 Integer32
 Unsigned32
 Counter32
 Counter64
 Gauage32
September 4, 2013 22
SIMPLE TYPE
September 4, 2013 23
CODES FOR DATA TYPE
 Sequence (like structure)
• Combination of simple data types,not of same
type.
 Sequence of (like array)
• Combination of simple data types all of same type.
September 4, 2013 24
STRUCTURED DATA TYPE
September 4, 2013 25
CONCEPTUAL DATA TYPES
September 4, 2013 26
ENCODING FORMAT
September 4, 2013 27
HOW TO DEFINE INTEGER -14
September 4, 2013 28
HOW TO DEFINE OBJECT IDENTIFIER
1.3.6.1(iso.org.dod.internet)
September 4, 2013 29
HOW TO DEFINE IP ADDRESS
131.21.14.8
 Sequence (like array)
September 4, 2013 30
MIB2
September 4, 2013 31
UDP GROUP
September 4, 2013 32
UDP VARIABLE AND TABLES
September 4, 2013 33
INDEXES FOR UDP TABLE
September 4, 2013 34
LEXICOGRAPHIC ORDERING
 Five messages of SNMP
1.Get Request
->Sent by manager requesting specific data
from agent
2.Get Next Request
->Retrieves the next value of the next lexical
MIB variable.
3.Get Response
->Agent respond with data for get and set
requests from the manager.
September 4, 2013 35
SNMP MESSAGES
4.Set Request
->Initializes or changes the value of network
element
5.Trap
->Alarm generated by an agent
September 4, 2013 36
SNMP MESSAGES
September 4, 2013 37
TYPES OF ERRORS
• Traps are unrequested event reports that are sent
to a management system by an SNMP agent
process
• When a trappable event occurs, a trap message is
generated by the agent and is sent to a trap
destination (a specific, configured network
address)
• Many events can be configured to signal a
trap, like a network cable fault, failing Hard
Drive, a “General Protection Fault”, or a power
supply failure
September 4, 2013 38
WHAT IS TRAP
• Traps can also be throttled -- You can limit the
number of traps sent per second from the agent
• Traps have a priority associated with them --
Critical, Major, Minor, Warning, Marginal,
Informational, Normal, Unknown
September 4, 2013 39
WHAT IS TRAP
(0).coldStart -agent has been booted
(1).warmStart -agent has been rebooted
(2).linkDown -interface has gone down
(3).Linkup -interface has come up
September 4, 2013 40
TRAP TYPES
4.authenticationFailure -invalid community
5.egpNeighbourLoss -router has gone to down state
6.enterpriseSpecific -other messages
September 4, 2013 41
TRAP TYPES
September 4, 2013 42
PORTS NUMBERS FOR SNMP
September 4, 2013 43
COMMERCIAL SNMP APPLICATIONS
Here are some of the various SNMP Management products available today
•http://www.hp.com/go/openview/ HP OpenView
•http://www.tivoli.com/ IBM NetView
•http://www.novell.com/products/managewise/ Novell ManageWise
•http://www.sun.com/solstice/ Sun MicroSystems Solstice
•http://www.microsoft.com/smsmgmt/ Microsoft SMS Server
•http://www.compaq.com/products/servers/management/ Compaq Insight Manger
•http://www.redpt.com/ SnmpQL - ODBC Compliant
•http://www.empiretech.com/ Empire Technologies
•ftp://ftp.cinco.com/users/cinco/demo/ Cinco Networks NetXray
•http://www.netinst.com/html/snmp.html SNMP Collector (Win9X/NT)
•http://www.netinst.com/html/Observer.html Observer
•http://www.gordian.com/products_technologies/snmp.html Gordian’s SNMP Agent
•http://www.castlerock.com/ Castle Rock Computing
•http://www.adventnet.com/ Advent Network Management
•http://www.smplsft.com/ SimpleAgent, SimpleTester
 Standardized
 Universally supported
 Extendible
 Portable
 Allows distributed management access
 Light weight protocol
September 4, 2013 44
ADVANTAGES OF USING SNMP
 TCP/IP protocol suite by Behrouz A. Forouzan.
 Internetworking with TCP/IP,principles,protocols
and architectures by Douglas E. Comer.
 Network management principles and practices by
mani Subhramanian.
 http://en.wikipedia.org/wiki/Simple_Network_M
anagement_Protocol
 http://www.erlang.org/doc/apps/snmp/snm
p.pdf
 http://www.hit.bme.hu/~jakab/edu/litr/SNMP/s
nmp_basics.pdf
September 4, 2013 45
REFERENCES
Snmp by akhilesh verma

Más contenido relacionado

La actualidad más candente

La actualidad más candente (9)

IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
 
IPv6 Security
IPv6 SecurityIPv6 Security
IPv6 Security
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
 
Wireshark
Wireshark Wireshark
Wireshark
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
 
SSL Layer
SSL LayerSSL Layer
SSL Layer
 
Ipsec
IpsecIpsec
Ipsec
 

Destacado

Simple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapSimple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapVikas Jagtap
 
Snmp class
Snmp classSnmp class
Snmp classaduitsis
 
Nagios Conference 2011 - Mike Weber - Training: Getting Started With SNMP
Nagios Conference 2011 - Mike Weber - Training: Getting Started With SNMPNagios Conference 2011 - Mike Weber - Training: Getting Started With SNMP
Nagios Conference 2011 - Mike Weber - Training: Getting Started With SNMPNagios
 
SNMP Overview (SNMP 소개)
SNMP Overview (SNMP 소개)SNMP Overview (SNMP 소개)
SNMP Overview (SNMP 소개)Ye Joo Park
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the EssentialsLiving Online
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker ProjectPraveen Mathews
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069William Lee
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-IIManageEngine
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp1991shalu
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 

Destacado (20)

SNMP
SNMPSNMP
SNMP
 
Simple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapSimple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtap
 
Snmp class
Snmp classSnmp class
Snmp class
 
Nagios Conference 2011 - Mike Weber - Training: Getting Started With SNMP
Nagios Conference 2011 - Mike Weber - Training: Getting Started With SNMPNagios Conference 2011 - Mike Weber - Training: Getting Started With SNMP
Nagios Conference 2011 - Mike Weber - Training: Getting Started With SNMP
 
SNMP Overview (SNMP 소개)
SNMP Overview (SNMP 소개)SNMP Overview (SNMP 소개)
SNMP Overview (SNMP 소개)
 
Snmp
SnmpSnmp
Snmp
 
Weblogic snmp
Weblogic snmpWeblogic snmp
Weblogic snmp
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the Essentials
 
Snmp
SnmpSnmp
Snmp
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Protocol snmp
Protocol snmpProtocol snmp
Protocol snmp
 
SNMP
SNMPSNMP
SNMP
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Snmp
SnmpSnmp
Snmp
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 

Similar a Snmp by akhilesh verma

NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
OMA Lightweight M2M Tutorial
OMA Lightweight M2M TutorialOMA Lightweight M2M Tutorial
OMA Lightweight M2M Tutorialzdshelby
 
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...IRJET Journal
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
Noorbehbahani data preprocessing for anomaly based network intrusion
Noorbehbahani data preprocessing for anomaly based network intrusionNoorbehbahani data preprocessing for anomaly based network intrusion
Noorbehbahani data preprocessing for anomaly based network intrusionnoorbehbahani
 
Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing PayamBarnaghi
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationThomasGraf42
 
Security Testing of Network Protocol Implementation
Security Testing of Network Protocol ImplementationSecurity Testing of Network Protocol Implementation
Security Testing of Network Protocol ImplementationIRJET Journal
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingIRJET Journal
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MHannes Tschofenig
 
OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOpen Mobile Alliance
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterEnergySec
 
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...Nagios
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
Module 2: Why NETCONF and YANG
Module 2: Why NETCONF and YANGModule 2: Why NETCONF and YANG
Module 2: Why NETCONF and YANGTail-f Systems
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET Journal
 

Similar a Snmp by akhilesh verma (20)

NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
OMA Lightweight M2M Tutorial
OMA Lightweight M2M TutorialOMA Lightweight M2M Tutorial
OMA Lightweight M2M Tutorial
 
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
Using Data Mining for Discovering Anomalies from Firewall Logs: a Comprehensi...
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Noorbehbahani data preprocessing for anomaly based network intrusion
Noorbehbahani data preprocessing for anomaly based network intrusionNoorbehbahani data preprocessing for anomaly based network intrusion
Noorbehbahani data preprocessing for anomaly based network intrusion
 
Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing Lecture 6: IoT Data Processing
Lecture 6: IoT Data Processing
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh Integration
 
Security Testing of Network Protocol Implementation
Security Testing of Network Protocol ImplementationSecurity Testing of Network Protocol Implementation
Security Testing of Network Protocol Implementation
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud Computing
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
 
OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACE
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
 
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
Module 2: Why NETCONF and YANG
Module 2: Why NETCONF and YANGModule 2: Why NETCONF and YANG
Module 2: Why NETCONF and YANG
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Snmp by akhilesh verma

  • 1. Presented By: Akhilesh Verma Roll No-122601 ME (ECE) Regular SIMPLE NETWORK MANAGEMENT PROTOCOL
  • 2.  INTRODUCTION  CONCEPT  MANAGEMENT COMPONENTS • SMI • MIB  SNMP  MESSAGES  UDP PORTS  APPLICATIONS  ADVANTAGES  REFERENCES September 4, 2013 2 CONTENTS
  • 3.  The Simple Network Management Protocol (SNMP) is an application layer protocol used to manage network resources. This standardization gives network administrators the ability to monitor network performance.  Defines the format of packets exchanged between a manager and an agent.  It reads and changes the status (values) of objects(variables) in SNMP packets. September 4, 2013 3 INTRODUCTION
  • 4. September 4, 2013 4 CONCEPT AGENT AGENT VARIABLES
  • 5.  Here is a very simplified picture.  Network manager contact to the agent through TCP/IP protocol.  The agent resides in the managed devices and this agent have some agent variables which should be available to this manger for monitoring. September 4, 2013 5 CONCEPT
  • 6.  AGENT: • A router or host that runs the SNMP server program. • Keep the performance information in a data base. • Can send a trap to the manager if something unusual occurs. September 4, 2013 6 CONCEPT
  • 7.  MANAGER: • A host that runs the SNMP client program. • Has access to values in the agent database. September 4, 2013 7 CONCEPT
  • 8.  A manager checks an agent by requesting information that reflects the behaviour of the agent.  A manager forces an agent to perform a task by resetting values in the agent database.  An agent contributes to the management process by warning the manager of an unusual situation September 4, 2013 8 CONCEPT
  • 10.  Management September 4, 2013 10 MANAGEMENT COMPONENTS SNMP SMI MIB
  • 11.  This is the actual SNMP protocol itself.  It defines how information is exchanged between SNMP agents and network management stations.  The SNMP protocol operations define the various SNMP messages and how they are created and used. September 4, 2013 11 SNMP
  • 12.  SNMP transport mappings describe how SNMP can be used over various underlying internetworks such as TCP/IP,IPX and others.  It simply an application program that has a client on the manager and a server on the agent. September 4, 2013 12 SNMP
  • 13. STRUCTURE OF MANAGEMENT INFORMATION September 4, 2013 13
  • 14.  SMI defines the general rules for naming objects, defining object type (including range and length), showing how to encode object and values.  SMI does not define the number of objects, an entity should manage or name the objects to be managed or define the association between the objects and their values. September 4, 2013 14 SMI
  • 15.  To name objects.  To define the type of data that can be stored in the object.  To show how to encode the data for transmission. September 4, 2013 15 SMI FUNCTION
  • 17.  Creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. September 4, 2013 17 MIB
  • 18. September 4, 2013 18 OBJECT ATTRIBUTES
  • 19. September 4, 2013 19 OBJECT IDENTIFIER
  • 20.  All objects managed by SNMP are given an object identifier.  The object identifier always starts with 1.3.6.1.2.1. September 4, 2013 20 OBJECT IDENTIFIER
  • 21. September 4, 2013 21 DATA TYPE
  • 22.  Integer32  Unsigned32  Counter32  Counter64  Gauage32 September 4, 2013 22 SIMPLE TYPE
  • 23. September 4, 2013 23 CODES FOR DATA TYPE
  • 24.  Sequence (like structure) • Combination of simple data types,not of same type.  Sequence of (like array) • Combination of simple data types all of same type. September 4, 2013 24 STRUCTURED DATA TYPE
  • 25. September 4, 2013 25 CONCEPTUAL DATA TYPES
  • 26. September 4, 2013 26 ENCODING FORMAT
  • 27. September 4, 2013 27 HOW TO DEFINE INTEGER -14
  • 28. September 4, 2013 28 HOW TO DEFINE OBJECT IDENTIFIER 1.3.6.1(iso.org.dod.internet)
  • 29. September 4, 2013 29 HOW TO DEFINE IP ADDRESS 131.21.14.8
  • 30.  Sequence (like array) September 4, 2013 30 MIB2
  • 31. September 4, 2013 31 UDP GROUP
  • 32. September 4, 2013 32 UDP VARIABLE AND TABLES
  • 33. September 4, 2013 33 INDEXES FOR UDP TABLE
  • 34. September 4, 2013 34 LEXICOGRAPHIC ORDERING
  • 35.  Five messages of SNMP 1.Get Request ->Sent by manager requesting specific data from agent 2.Get Next Request ->Retrieves the next value of the next lexical MIB variable. 3.Get Response ->Agent respond with data for get and set requests from the manager. September 4, 2013 35 SNMP MESSAGES
  • 36. 4.Set Request ->Initializes or changes the value of network element 5.Trap ->Alarm generated by an agent September 4, 2013 36 SNMP MESSAGES
  • 37. September 4, 2013 37 TYPES OF ERRORS
  • 38. • Traps are unrequested event reports that are sent to a management system by an SNMP agent process • When a trappable event occurs, a trap message is generated by the agent and is sent to a trap destination (a specific, configured network address) • Many events can be configured to signal a trap, like a network cable fault, failing Hard Drive, a “General Protection Fault”, or a power supply failure September 4, 2013 38 WHAT IS TRAP
  • 39. • Traps can also be throttled -- You can limit the number of traps sent per second from the agent • Traps have a priority associated with them -- Critical, Major, Minor, Warning, Marginal, Informational, Normal, Unknown September 4, 2013 39 WHAT IS TRAP
  • 40. (0).coldStart -agent has been booted (1).warmStart -agent has been rebooted (2).linkDown -interface has gone down (3).Linkup -interface has come up September 4, 2013 40 TRAP TYPES
  • 41. 4.authenticationFailure -invalid community 5.egpNeighbourLoss -router has gone to down state 6.enterpriseSpecific -other messages September 4, 2013 41 TRAP TYPES
  • 42. September 4, 2013 42 PORTS NUMBERS FOR SNMP
  • 43. September 4, 2013 43 COMMERCIAL SNMP APPLICATIONS Here are some of the various SNMP Management products available today •http://www.hp.com/go/openview/ HP OpenView •http://www.tivoli.com/ IBM NetView •http://www.novell.com/products/managewise/ Novell ManageWise •http://www.sun.com/solstice/ Sun MicroSystems Solstice •http://www.microsoft.com/smsmgmt/ Microsoft SMS Server •http://www.compaq.com/products/servers/management/ Compaq Insight Manger •http://www.redpt.com/ SnmpQL - ODBC Compliant •http://www.empiretech.com/ Empire Technologies •ftp://ftp.cinco.com/users/cinco/demo/ Cinco Networks NetXray •http://www.netinst.com/html/snmp.html SNMP Collector (Win9X/NT) •http://www.netinst.com/html/Observer.html Observer •http://www.gordian.com/products_technologies/snmp.html Gordian’s SNMP Agent •http://www.castlerock.com/ Castle Rock Computing •http://www.adventnet.com/ Advent Network Management •http://www.smplsft.com/ SimpleAgent, SimpleTester
  • 44.  Standardized  Universally supported  Extendible  Portable  Allows distributed management access  Light weight protocol September 4, 2013 44 ADVANTAGES OF USING SNMP
  • 45.  TCP/IP protocol suite by Behrouz A. Forouzan.  Internetworking with TCP/IP,principles,protocols and architectures by Douglas E. Comer.  Network management principles and practices by mani Subhramanian.  http://en.wikipedia.org/wiki/Simple_Network_M anagement_Protocol  http://www.erlang.org/doc/apps/snmp/snm p.pdf  http://www.hit.bme.hu/~jakab/edu/litr/SNMP/s nmp_basics.pdf September 4, 2013 45 REFERENCES