Chapter 9 v6.0

Chapter 9
Network Management
A note on the use of these ppt slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs.
They obviously represent a lot of work on our part. In return for use, we only
ask the following:
 If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
 If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this
material.
Thanks and enjoy! JFK/KWR

Computer
Networking: A Top
Down Approach
6th edition
Jim Kurose, Keith Ross
Addison-Wesley
March 2012

All material copyright 1996-2012
J.F Kurose and K.W. Ross, All Rights Reserved
Network Management

9-1
Chapter 9: Network Management
Chapter goals:






introduction to network management
 motivation
 major components
Internet network management framework
 MIB: management information base
 SMI: data definition language
 SNMP: protocol for network management
 security and administration
presentation services: ASN.1
Network Management

9-2
Chapter 9 outline
What is network management?
 Internet-standard management framework
 Structure of Management Information: SMI
 Management Information Base: MIB
 SNMP Protocol Operations and Transport
Mappings
 Security and Administration
 ASN.1


Network Management

9-3
What is network management?




autonomous systems (aka “network”): 1000s of interacting
hardware/software components
other complex systems requiring monitoring, control:
 jet airplane
 nuclear power plant
 others?
"Network management includes the deployment, integration
and coordination of the hardware, software, and human
elements to monitor, test, poll, configure, analyze, evaluate,
and control the network and element resources to meet the
real-time, operational performance, and Quality of Service
requirements at a reasonable cost."
Network Management

9-4
Infrastructure for network management
definitions:
managing entity
managing
data
entity
network
management
protocol

agent data

managed device
agent data

agent data

managed device

managed device

agent data

agent data

managed devices
contain
managed objects
whose
data is gathered into a
Management
Information
Base (MIB)

managed device
managed device

Network Management

9-5
Network management standards
OSI CMIP
 Common
Management
Information Protocol
 designed 1980’s: the
unifying net
management standard
 too slowly
standardized

SNMP: Simple Network
Management Protocol
 Internet roots (SGMP)
 started simple
 deployed, adopted rapidly
 growth: size, complexity
 currently: SNMP V3
 de facto network
management standard
Network Management

9-6
Chapter 9 outline
What is network management?
 Internet-standard management framework
 Structure of Management Information: SMI
 Management Information Base: MIB
 SNMP Protocol Operations and Transport
Mappings
 Security and Administration
 ASN.1


Network Management

9-7
SNMP overview: 4 key parts


Management information base (MIB):
 distributed information store of network management data



Structure of Management Information (SMI):
 data definition language for MIB objects



SNMP protocol
 convey manager<->managed object info, commands



security, administration capabilities
 major addition in SNMPv3

Network Management

9-8
SMI: data definition language
Purpose: syntax, semantics of
management data welldefined, unambiguous






base data types:
 straightforward, boring
OBJECT-TYPE
 data type, status, semantics
of managed object
MODULE-IDENTITY
 groups related objects into
MIB module

Basic Data Types
INTEGER
Integer32
Unsigned32
OCTET STRING
OBJECT IDENTIFIED
IPaddress
Counter32
Counter64
Guage32
Time Ticks
Opaque
Network Management

9-9
SNMP MIB
MIB module specified via SMI
MODULE-IDENTITY
(100 standardized MIBs, more vendor-specific)

MODULE

OBJECT TYPE:

OBJECT TYPE:
OBJECT TYPE:

objects specified via SMI
OBJECT-TYPE construct
Network Management 9-10
SMI: object, module examples
OBJECT-TYPE: ipInDelivers
ipInDelivers OBJECT TYPE
SYNTAX
Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
“The total number of input
datagrams successfully
delivered to IP userprotocols (including ICMP)”
::= { ip 9}

MODULE-IDENTITY: ipMIB
ipMIB MODULE-IDENTITY
LAST-UPDATED “941101000Z”
ORGANZATION “IETF SNPv2
Working Group”
CONTACT-INFO
“ Keith McCloghrie
……”
DESCRIPTION
“The MIB module for managing IP
and ICMP implementations, but
excluding their management of
IP routes.”
REVISION “019331000Z”
………
::= {mib-2 48}
Network Management 9-11
MIB example: UDP module
Object ID

Name

Type

1.3.6.1.2.1.7.1

UDPInDatagrams Counter32

Comments
total # datagrams delivered
at this node

1.3.6.1.2.1.7.2

UDPNoPorts

Counter32

# underliverable datagrams:
no application at port

1.3.6.1.2.1.7.3

UDInErrors

Counter32

# undeliverable datagrams:
all other reasons

1.3.6.1.2.1.7.4

UDPOutDatagrams Counter32

# datagrams sent

1.3.6.1.2.1.7.5

udpTable

one entry for each port

SEQUENCE

in use by app, gives port #
and IP address
Network Management 9-12
SNMP naming
question: how to name every possible standard object
(protocol, data, more..) in every possible network
standard??
answer: ISO Object Identifier tree:
 hierarchical naming of all objects
 each branchpoint has name, number
1.3.6.1.2.1.7.1
ISO
ISO-ident. Org.
US DoD
Internet

udpInDatagrams
UDP
MIB2
management
Network Management 9-13
OSI
Object
Identifier
Tree

Network Management 9-14
SNMP protocol
Two ways to convey MIB info, commands:

managing
entity

request
response
agent data
managed device

request/response mode

managing
entity

trap msg

agent data
managed device

trap mode
Network Management 9-15
SNMP protocol: message types
Message type

Function

GetRequest
GetNextRequest
GetBulkRequest

Mgr-to-agent: “get me data”
(instance,next in list, block)

InformRequest
SetRequest
Response
Trap

Mgr-to-Mgr: here’s MIB value
Mgr-to-agent: set MIB value
Agent-to-mgr: value, response to
Request
Agent-to-mgr: inform manager
of exceptional event
Network Management 9-16
SNMP protocol: message
formats
Variables to get/set

Get/set header
PDU
type
(0-3)

PDU
type
4

Request
ID

Error
Status
(0-5)

Enterprise Agent
Addr

Error
Index

Trap
Type
(0-7)

Name

Specific
code

Trap header

Value Name

Time
stamp

Value ….

Name Value ….
Trap info

SNMP PDU

Network Management 9-17
SNMP security and administration
encryption: DES-encrypt SNMP message
 authentication: compute, send MIC(m,k):
compute hash (MIC) over message (m), secret
shared key (k)
 protection against playback: use nonce
 view-based access control:


 SNMP entity maintains database of access rights,
policies for various users
 database itself accessible as managed object!

Network Management 9-18
Chapter 9 outline
What is network management?
 Internet-standard management framework
 Structure of Management Information: SMI
 Management Information Base: MIB
 SNMP Protocol Operations and Transport
Mappings
 Security and Administration
 The presentation problem: ASN.1


Network Management 9-19
The presentation problem
Q: does perfect memory-to-memory copy solve
“the communication problem”?
A: not always!
struct {
char code;
int x;
} test;
test.x = 256;
test.code=‘a’

test.code
test.x

a
00000001
00000011

host 1 format

test.code
test.x

a
00000011
00000001
host 2 format

problem: different data format, storage conventions
Network Management 9-20
A real-life presentation problem:
?

?

?

?

?

?

?

?
Groovy!
grandma

2012 teenager

aging 60’s
hippie
Network Management 9-21
Presentation problem: potential solutions
1. Sender learns receiver’s format. Sender translates
into receiver’s format. Sender sends.
– real-world analogy?
– pros and cons?

2. Sender sends. Receiver learns sender’s format.
Receiver translate into receiver-local format
– real-world-analogy
– pros and cons?

3. Sender translates host-independent format. Sends.
Receiver translates to receiver-local format.
– real-world analogy?
– pros and cons?

Network Management 9-22
Solving the presentation problem
1. Translate local-host format to host-independent format
2. Transmit data in host-independent format
3. Translate host-independent format to remote-host format
“It is pleasing
to me!”
presentation
service

service

“Cat’s pajamas!”
!

“It is pleasing
to me!”
presentation
“Groovy!”

presentation
service

“Awesome, dude!”

!

!

!

!
grandma

!
aging 60’s
hippie

!
!

2012 teenager
Network Management 9-23
ASN.1: Abstract Syntax Notation 1


ISO standard X.680
 used extensively in Internet
 like eating vegetables, knowing this “good for you”!



defined data types, object constructors
 like SMI



BER: Basic Encoding Rules
 specify how ASN.1-defined data objects to be transmitted
 each transmitted object has Type, Length, Value (TLV)
encoding

Network Management 9-24
TLV Encoding
Idea: transmitted data is self-identifying
 T: data type, one of ASN.1-defined types
 L: length of data in bytes
 V: value of data, encoded according to ASN.1 standard
Tag Value
1
2
3
4
5
6
9

Type
Boolean
Integer
Bitstring
Octet string
Null
Object Identifier
Real
Network Management 9-25
TLV
encoding:
example

{weight, 259}
{lastname, “smith”}

lastname ::= OCTET STRING
weight ::= INTEGER
module of data type
declarations written
in ASN.1

instances of data type
specified in module

Basic Encoding Rules
(BER)

Value, 259
Length, 2 bytes
Type=2, integer

Value, 5 octets (chars)

Length, 5 bytes
Type=4, octet string

3
1
2
2
h
t
i
m
s
5
4

transmitted
byte
stream

Network Management 9-26
Network management: summary
network management
 extremely important: 80% of network “cost”
 ASN.1 for data description
 SNMP protocol as a tool for conveying
information
 network management: more art than science
 what to measure/monitor
 how to respond to failures?
 alarm correlation/filtering?


Network Management 9-27
1 de 27

Recomendados

computer communication networks MCQs por
 computer communication networks MCQs   computer communication networks MCQs
computer communication networks MCQs raghad mejeed
104 vistas18 diapositivas
Chapter 3 v6.01 por
Chapter 3 v6.01Chapter 3 v6.01
Chapter 3 v6.01Savvas Dimopoulos
2.1K vistas110 diapositivas
Firewalls Security – Features and Benefits por
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
8.1K vistas12 diapositivas
Sdd template por
Sdd templateSdd template
Sdd templateShakeel Ahmed, PhD
3.4K vistas7 diapositivas
Slides of SNMP (Simple network management protocol) por
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Shahrukh Ali Khan
1.4K vistas17 diapositivas
Konfigurasi DHCP Server dan DHCP Relay Agent di Mikrotik Menggunakan GNS3 por
Konfigurasi DHCP Server dan DHCP Relay Agent di Mikrotik Menggunakan GNS3Konfigurasi DHCP Server dan DHCP Relay Agent di Mikrotik Menggunakan GNS3
Konfigurasi DHCP Server dan DHCP Relay Agent di Mikrotik Menggunakan GNS3I Putu Hariyadi
3.7K vistas20 diapositivas

Más contenido relacionado

La actualidad más candente

Chapter 4 v6.11 por
Chapter 4 v6.11Chapter 4 v6.11
Chapter 4 v6.11Savvas Dimopoulos
3.6K vistas157 diapositivas
SIP Tutorial/Workshop 1 por
SIP Tutorial/Workshop 1SIP Tutorial/Workshop 1
SIP Tutorial/Workshop 1Mihály Mészáros
700 vistas75 diapositivas
Software Requirements Specification Final por
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Finaljangjong
24.9K vistas20 diapositivas
Nokia L3 VPN Configuration Guide por
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideAbel Saduwa
489 vistas133 diapositivas
Chapter 2 - Computer Networking a top-down Approach 7th por
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
3.2K vistas106 diapositivas
Juniper Bgp por
Juniper BgpJuniper Bgp
Juniper BgpHussein Elmenshawy
1.2K vistas67 diapositivas

La actualidad más candente(20)

Software Requirements Specification Final por jangjong
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Final
jangjong24.9K vistas
Nokia L3 VPN Configuration Guide por Abel Saduwa
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration Guide
Abel Saduwa489 vistas
Pengalamatan Network Layer por rosmida
Pengalamatan Network LayerPengalamatan Network Layer
Pengalamatan Network Layer
rosmida1.6K vistas
SIP for geeks por Kundan Singh
SIP for geeksSIP for geeks
SIP for geeks
Kundan Singh19.2K vistas
Database design and Development por Md. Mahbub Alam
Database design and DevelopmentDatabase design and Development
Database design and Development
Md. Mahbub Alam2.9K vistas
Soal dan jawaban_jaringan_dasar_kelas_x por Core Pale
Soal dan jawaban_jaringan_dasar_kelas_xSoal dan jawaban_jaringan_dasar_kelas_x
Soal dan jawaban_jaringan_dasar_kelas_x
Core Pale4.6K vistas
Web Security Deployment por Cisco Canada
Web Security DeploymentWeb Security Deployment
Web Security Deployment
Cisco Canada15.9K vistas
Merancang bangun dan mengkonfigurasi wifi router por regirolansa98
Merancang bangun dan mengkonfigurasi wifi routerMerancang bangun dan mengkonfigurasi wifi router
Merancang bangun dan mengkonfigurasi wifi router
regirolansa983K vistas
SRS for student database management system por Suman Saurabh
SRS for student database management systemSRS for student database management system
SRS for student database management system
Suman Saurabh63K vistas
Software Design Description (SDD) sample por Peny Gama
Software Design Description (SDD) sampleSoftware Design Description (SDD) sample
Software Design Description (SDD) sample
Peny Gama65K vistas

Similar a Chapter 9 v6.0

Chapter9 network managment-3ed por
Chapter9 network managment-3edChapter9 network managment-3ed
Chapter9 network managment-3edKhánh Ghẻ
188 vistas14 diapositivas
Computernetworkingkurosech9 091011003335-phpapp01 por
Computernetworkingkurosech9 091011003335-phpapp01Computernetworkingkurosech9 091011003335-phpapp01
Computernetworkingkurosech9 091011003335-phpapp01AislanSoares
576 vistas27 diapositivas
Chapter 9Network ManagementComputer Networking A Top Down A.docx por
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docxtiffanyd4
4 vistas15 diapositivas
Chapter 9Network ManagementComputer Networking A Top Down A.docx por
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docxmccormicknadine86
8 vistas15 diapositivas
Datacom Section 8 - NetworkManagment.ppt por
Datacom Section 8 - NetworkManagment.pptDatacom Section 8 - NetworkManagment.ppt
Datacom Section 8 - NetworkManagment.pptKristopher Hefner
5 vistas26 diapositivas
Centralized monitoring station for it computing and network infrastructure1 por
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
7.2K vistas60 diapositivas

Similar a Chapter 9 v6.0(20)

Chapter9 network managment-3ed por Khánh Ghẻ
Chapter9 network managment-3edChapter9 network managment-3ed
Chapter9 network managment-3ed
Khánh Ghẻ188 vistas
Computernetworkingkurosech9 091011003335-phpapp01 por AislanSoares
Computernetworkingkurosech9 091011003335-phpapp01Computernetworkingkurosech9 091011003335-phpapp01
Computernetworkingkurosech9 091011003335-phpapp01
AislanSoares576 vistas
Chapter 9Network ManagementComputer Networking A Top Down A.docx por tiffanyd4
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docx
tiffanyd44 vistas
Chapter 9Network ManagementComputer Networking A Top Down A.docx por mccormicknadine86
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docx
Centralized monitoring station for it computing and network infrastructure1 por MOHD ARISH
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH7.2K vistas
Summer training at WIPRO por prerna setia
Summer training at WIPROSummer training at WIPRO
Summer training at WIPRO
prerna setia349 vistas
Simple Network Management Protocole por Amin Komeili
Simple Network Management ProtocoleSimple Network Management Protocole
Simple Network Management Protocole
Amin Komeili757 vistas
BSA 385 Week 3 Individual Assignment Essay por Tara Smith
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
Tara Smith2 vistas
Difference Between Peer Server Vs Client Server Network por Patrice Miller
Difference Between Peer Server Vs Client Server NetworkDifference Between Peer Server Vs Client Server Network
Difference Between Peer Server Vs Client Server Network
Patrice Miller2 vistas
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting por Jaime Martin Losa
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingDDS Advanced Tutorial - OMG June 2013 Berlin Meeting
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
Jaime Martin Losa8.7K vistas
Tm128 Microsoft Server Technologies por Lindsey Jones
Tm128 Microsoft Server TechnologiesTm128 Microsoft Server Technologies
Tm128 Microsoft Server Technologies
Lindsey Jones2 vistas
Apache Kafka and the Data Mesh | Ben Stopford and Michael Noll, Confluent por HostedbyConfluent
Apache Kafka and the Data Mesh | Ben Stopford and Michael Noll, ConfluentApache Kafka and the Data Mesh | Ben Stopford and Michael Noll, Confluent
Apache Kafka and the Data Mesh | Ben Stopford and Michael Noll, Confluent
HostedbyConfluent2.7K vistas
SDN-enhanced Services in Enterprises and Data Centers por Anees Shaikh
SDN-enhanced Services in Enterprises and Data CentersSDN-enhanced Services in Enterprises and Data Centers
SDN-enhanced Services in Enterprises and Data Centers
Anees Shaikh794 vistas
Disadvantages Of Raspberry Pi Board por Liz Brown
Disadvantages Of Raspberry Pi BoardDisadvantages Of Raspberry Pi Board
Disadvantages Of Raspberry Pi Board
Liz Brown4 vistas
P1 Unit 3 Network Analysis por Lori Flores
P1 Unit 3 Network AnalysisP1 Unit 3 Network Analysis
P1 Unit 3 Network Analysis
Lori Flores5 vistas

Más de Savvas Dimopoulos

Chapter 8 v6.0 por
Chapter 8 v6.0Chapter 8 v6.0
Chapter 8 v6.0Savvas Dimopoulos
1.4K vistas131 diapositivas
Chapter 6 v6.0 por
Chapter 6 v6.0Chapter 6 v6.0
Chapter 6 v6.0Savvas Dimopoulos
1.8K vistas69 diapositivas
Chapter 5 v6.01 por
Chapter 5 v6.01Chapter 5 v6.01
Chapter 5 v6.01Savvas Dimopoulos
2K vistas97 diapositivas
Chapter 2 v6.3 por
Chapter 2 v6.3Chapter 2 v6.3
Chapter 2 v6.3Savvas Dimopoulos
4.9K vistas109 diapositivas
Chapter 1 v6.1 por
Chapter 1 v6.1Chapter 1 v6.1
Chapter 1 v6.1Savvas Dimopoulos
2.2K vistas75 diapositivas
Communication systems 4 th edition simon haykin with solutions manual por
Communication systems 4 th edition simon haykin with solutions manualCommunication systems 4 th edition simon haykin with solutions manual
Communication systems 4 th edition simon haykin with solutions manualSavvas Dimopoulos
30.8K vistas1397 diapositivas

Más de Savvas Dimopoulos(7)

Último

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
184 vistas12 diapositivas
Business Analyst Series 2023 - Week 4 Session 8 por
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8DianaGray10
123 vistas13 diapositivas
The Role of Patterns in the Era of Large Language Models por
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
85 vistas65 diapositivas
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
166 vistas28 diapositivas
Qualifying SaaS, IaaS.pptx por
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptxSachin Bhandari
1K vistas8 diapositivas
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
145 vistas17 diapositivas

Último(20)

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue184 vistas
Business Analyst Series 2023 - Week 4 Session 8 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10123 vistas
The Role of Patterns in the Era of Large Language Models por Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li85 vistas
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue166 vistas
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue145 vistas
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue138 vistas
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue180 vistas
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue203 vistas
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker54 vistas
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 vistas
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue238 vistas
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... por ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 vistas
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue263 vistas
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue297 vistas
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue198 vistas
The Power of Heat Decarbonisation Plans in the Built Environment por IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 vistas
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... por ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 vistas

Chapter 9 v6.0

  • 1. Chapter 9 Network Management A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) that you mention their source (after all, we’d like people to use our book!)  If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Network Management 9-1
  • 2. Chapter 9: Network Management Chapter goals:    introduction to network management  motivation  major components Internet network management framework  MIB: management information base  SMI: data definition language  SNMP: protocol for network management  security and administration presentation services: ASN.1 Network Management 9-2
  • 3. Chapter 9 outline What is network management?  Internet-standard management framework  Structure of Management Information: SMI  Management Information Base: MIB  SNMP Protocol Operations and Transport Mappings  Security and Administration  ASN.1  Network Management 9-3
  • 4. What is network management?   autonomous systems (aka “network”): 1000s of interacting hardware/software components other complex systems requiring monitoring, control:  jet airplane  nuclear power plant  others? "Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost." Network Management 9-4
  • 5. Infrastructure for network management definitions: managing entity managing data entity network management protocol agent data managed device agent data agent data managed device managed device agent data agent data managed devices contain managed objects whose data is gathered into a Management Information Base (MIB) managed device managed device Network Management 9-5
  • 6. Network management standards OSI CMIP  Common Management Information Protocol  designed 1980’s: the unifying net management standard  too slowly standardized SNMP: Simple Network Management Protocol  Internet roots (SGMP)  started simple  deployed, adopted rapidly  growth: size, complexity  currently: SNMP V3  de facto network management standard Network Management 9-6
  • 7. Chapter 9 outline What is network management?  Internet-standard management framework  Structure of Management Information: SMI  Management Information Base: MIB  SNMP Protocol Operations and Transport Mappings  Security and Administration  ASN.1  Network Management 9-7
  • 8. SNMP overview: 4 key parts  Management information base (MIB):  distributed information store of network management data  Structure of Management Information (SMI):  data definition language for MIB objects  SNMP protocol  convey manager<->managed object info, commands  security, administration capabilities  major addition in SNMPv3 Network Management 9-8
  • 9. SMI: data definition language Purpose: syntax, semantics of management data welldefined, unambiguous    base data types:  straightforward, boring OBJECT-TYPE  data type, status, semantics of managed object MODULE-IDENTITY  groups related objects into MIB module Basic Data Types INTEGER Integer32 Unsigned32 OCTET STRING OBJECT IDENTIFIED IPaddress Counter32 Counter64 Guage32 Time Ticks Opaque Network Management 9-9
  • 10. SNMP MIB MIB module specified via SMI MODULE-IDENTITY (100 standardized MIBs, more vendor-specific) MODULE OBJECT TYPE: OBJECT TYPE: OBJECT TYPE: objects specified via SMI OBJECT-TYPE construct Network Management 9-10
  • 11. SMI: object, module examples OBJECT-TYPE: ipInDelivers ipInDelivers OBJECT TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION “The total number of input datagrams successfully delivered to IP userprotocols (including ICMP)” ::= { ip 9} MODULE-IDENTITY: ipMIB ipMIB MODULE-IDENTITY LAST-UPDATED “941101000Z” ORGANZATION “IETF SNPv2 Working Group” CONTACT-INFO “ Keith McCloghrie ……” DESCRIPTION “The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes.” REVISION “019331000Z” ……… ::= {mib-2 48} Network Management 9-11
  • 12. MIB example: UDP module Object ID Name Type 1.3.6.1.2.1.7.1 UDPInDatagrams Counter32 Comments total # datagrams delivered at this node 1.3.6.1.2.1.7.2 UDPNoPorts Counter32 # underliverable datagrams: no application at port 1.3.6.1.2.1.7.3 UDInErrors Counter32 # undeliverable datagrams: all other reasons 1.3.6.1.2.1.7.4 UDPOutDatagrams Counter32 # datagrams sent 1.3.6.1.2.1.7.5 udpTable one entry for each port SEQUENCE in use by app, gives port # and IP address Network Management 9-12
  • 13. SNMP naming question: how to name every possible standard object (protocol, data, more..) in every possible network standard?? answer: ISO Object Identifier tree:  hierarchical naming of all objects  each branchpoint has name, number 1.3.6.1.2.1.7.1 ISO ISO-ident. Org. US DoD Internet udpInDatagrams UDP MIB2 management Network Management 9-13
  • 15. SNMP protocol Two ways to convey MIB info, commands: managing entity request response agent data managed device request/response mode managing entity trap msg agent data managed device trap mode Network Management 9-15
  • 16. SNMP protocol: message types Message type Function GetRequest GetNextRequest GetBulkRequest Mgr-to-agent: “get me data” (instance,next in list, block) InformRequest SetRequest Response Trap Mgr-to-Mgr: here’s MIB value Mgr-to-agent: set MIB value Agent-to-mgr: value, response to Request Agent-to-mgr: inform manager of exceptional event Network Management 9-16
  • 17. SNMP protocol: message formats Variables to get/set Get/set header PDU type (0-3) PDU type 4 Request ID Error Status (0-5) Enterprise Agent Addr Error Index Trap Type (0-7) Name Specific code Trap header Value Name Time stamp Value …. Name Value …. Trap info SNMP PDU Network Management 9-17
  • 18. SNMP security and administration encryption: DES-encrypt SNMP message  authentication: compute, send MIC(m,k): compute hash (MIC) over message (m), secret shared key (k)  protection against playback: use nonce  view-based access control:   SNMP entity maintains database of access rights, policies for various users  database itself accessible as managed object! Network Management 9-18
  • 19. Chapter 9 outline What is network management?  Internet-standard management framework  Structure of Management Information: SMI  Management Information Base: MIB  SNMP Protocol Operations and Transport Mappings  Security and Administration  The presentation problem: ASN.1  Network Management 9-19
  • 20. The presentation problem Q: does perfect memory-to-memory copy solve “the communication problem”? A: not always! struct { char code; int x; } test; test.x = 256; test.code=‘a’ test.code test.x a 00000001 00000011 host 1 format test.code test.x a 00000011 00000001 host 2 format problem: different data format, storage conventions Network Management 9-20
  • 21. A real-life presentation problem: ? ? ? ? ? ? ? ? Groovy! grandma 2012 teenager aging 60’s hippie Network Management 9-21
  • 22. Presentation problem: potential solutions 1. Sender learns receiver’s format. Sender translates into receiver’s format. Sender sends. – real-world analogy? – pros and cons? 2. Sender sends. Receiver learns sender’s format. Receiver translate into receiver-local format – real-world-analogy – pros and cons? 3. Sender translates host-independent format. Sends. Receiver translates to receiver-local format. – real-world analogy? – pros and cons? Network Management 9-22
  • 23. Solving the presentation problem 1. Translate local-host format to host-independent format 2. Transmit data in host-independent format 3. Translate host-independent format to remote-host format “It is pleasing to me!” presentation service service “Cat’s pajamas!” ! “It is pleasing to me!” presentation “Groovy!” presentation service “Awesome, dude!” ! ! ! ! grandma ! aging 60’s hippie ! ! 2012 teenager Network Management 9-23
  • 24. ASN.1: Abstract Syntax Notation 1  ISO standard X.680  used extensively in Internet  like eating vegetables, knowing this “good for you”!  defined data types, object constructors  like SMI  BER: Basic Encoding Rules  specify how ASN.1-defined data objects to be transmitted  each transmitted object has Type, Length, Value (TLV) encoding Network Management 9-24
  • 25. TLV Encoding Idea: transmitted data is self-identifying  T: data type, one of ASN.1-defined types  L: length of data in bytes  V: value of data, encoded according to ASN.1 standard Tag Value 1 2 3 4 5 6 9 Type Boolean Integer Bitstring Octet string Null Object Identifier Real Network Management 9-25
  • 26. TLV encoding: example {weight, 259} {lastname, “smith”} lastname ::= OCTET STRING weight ::= INTEGER module of data type declarations written in ASN.1 instances of data type specified in module Basic Encoding Rules (BER) Value, 259 Length, 2 bytes Type=2, integer Value, 5 octets (chars) Length, 5 bytes Type=4, octet string 3 1 2 2 h t i m s 5 4 transmitted byte stream Network Management 9-26
  • 27. Network management: summary network management  extremely important: 80% of network “cost”  ASN.1 for data description  SNMP protocol as a tool for conveying information  network management: more art than science  what to measure/monitor  how to respond to failures?  alarm correlation/filtering?  Network Management 9-27