SlideShare una empresa de Scribd logo
1 de 6
How Simple Network
Management Protocol
      Works


・What is SNMP



・Internet Network Management Architecture



・SNMP basic components



・Versions of SNMP
What is SNMP(Simple Network
   Management Protocol)

Simple Network Management Protocol (SNMP) is a
component of the Internet Protocol Suite as defined by
the Internet Engineerring Task Force(IETF).

SNMP is used in network management systems to
monitor network-attached devices for conditions that
warrant administrative attention. It consists of a set of
standards for network management, including an
Application Layer protocol, a database schema, and a set
of data objects.
The internet network management
                 architecture
SNMP is part of the Internet network management
architecture. This architecture is based on the interaction of
many entities, as described in the following section.

  •   Agents
  •   Managed object
  •   Management information base (MIB)
  •   Syntax notation
  •   Structure of Management Information (SMI)
  •   Network management stations (NMSs)
  •   Parties
  •   Management protocol
SNMP basic components
An SNMP-managed network consists of three key
components:
  1.Managed devices

    A managed device is a network node that contains an
    SNMP agent and that resides on a managed network.

  2.Agents

    An agent is a network-management software module
    that resides in a managed device.

  3.Network-management stations (NMSs)

    A network management system (NMS) executes
    applications that monitor and control managed devices.
Versions of SNMP
SNMP has three versions.
・Version1
  SNMP version 1 is the initial implementation of the
  SNMP protocol. SNMP version 1 operates over
  protocols such as User Datagram Protocol, Internet
  Protocol, OSI Connectionless Network Service,
  AppleTalk Datagram-Delivery Protocol, and Novell
  Internet Packet Exchange .


・Version2
  SNMP version 2 revises version 1 and includes
  improvements in the areas of performance, security,
  confidentiality, and manager-to-manager
  communications.
  But, because new party-based security system in version
  2 is more complex, SNMP version 2 was not widely
  accepted.


・Version3
  SNMP version 3 provides three important services:
  authentication, privacy and access control. SNMP
  version 3 is defined as the current standard version of
  SNMP by the IETF. So, the IETF considersearlier
  versions as obsolete or historical.
References

・Wikipedia
  http://en.wikipedia.org/wiki/Simple_Network_Managem
  ent_Protocol


・Internet Architecture
   http://www.soi.wide.ad.jp/class/20030002/slides/03/19.h
   tml


・Javvin
   http://www.javvin.com/protocolSNMP.html


・Adventnet
  http://www.adventnet.com/products/javaagent/java_snm
  p_agent_ds.html

Más contenido relacionado

La actualidad más candente

Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network Management
Sorath Asnani
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
Sidharth Goel
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
Ramla Sheikh
 
Week10
Week10Week10
Week10
Hayato
 
E business solutions l07-netman
E business solutions l07-netmanE business solutions l07-netman
E business solutions l07-netman
Peter Merchant
 

La actualidad más candente (18)

Network performance management
Network performance managementNetwork performance management
Network performance management
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network Management
 
Network management
Network managementNetwork management
Network management
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Osi
OsiOsi
Osi
 
Snmp
SnmpSnmp
Snmp
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Week10
Week10Week10
Week10
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Nsm overview
Nsm overviewNsm overview
Nsm overview
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Android Network Management
Android Network ManagementAndroid Network Management
Android Network Management
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
E business solutions l07-netman
E business solutions l07-netmanE business solutions l07-netman
E business solutions l07-netman
 

Similar a group G

Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
ni35540
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
fashiionbeutycare
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
MOHD ARISH
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
jeronimored
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
useonlyfortech140
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
ashutosh rai
 

Similar a group G (20)

SNMP
SNMPSNMP
SNMP
 
SNMP Protocol
SNMP ProtocolSNMP Protocol
SNMP Protocol
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptx
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptx
 
snmp
snmpsnmp
snmp
 
Project report
Project reportProject report
Project report
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Net Man
Net ManNet Man
Net Man
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

group G

  • 1. How Simple Network Management Protocol Works ・What is SNMP ・Internet Network Management Architecture ・SNMP basic components ・Versions of SNMP
  • 2. What is SNMP(Simple Network Management Protocol) Simple Network Management Protocol (SNMP) is a component of the Internet Protocol Suite as defined by the Internet Engineerring Task Force(IETF). SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an Application Layer protocol, a database schema, and a set of data objects.
  • 3. The internet network management architecture SNMP is part of the Internet network management architecture. This architecture is based on the interaction of many entities, as described in the following section. • Agents • Managed object • Management information base (MIB) • Syntax notation • Structure of Management Information (SMI) • Network management stations (NMSs) • Parties • Management protocol
  • 4. SNMP basic components An SNMP-managed network consists of three key components: 1.Managed devices A managed device is a network node that contains an SNMP agent and that resides on a managed network. 2.Agents An agent is a network-management software module that resides in a managed device. 3.Network-management stations (NMSs) A network management system (NMS) executes applications that monitor and control managed devices.
  • 5. Versions of SNMP SNMP has three versions. ・Version1 SNMP version 1 is the initial implementation of the SNMP protocol. SNMP version 1 operates over protocols such as User Datagram Protocol, Internet Protocol, OSI Connectionless Network Service, AppleTalk Datagram-Delivery Protocol, and Novell Internet Packet Exchange . ・Version2 SNMP version 2 revises version 1 and includes improvements in the areas of performance, security, confidentiality, and manager-to-manager communications. But, because new party-based security system in version 2 is more complex, SNMP version 2 was not widely accepted. ・Version3 SNMP version 3 provides three important services: authentication, privacy and access control. SNMP version 3 is defined as the current standard version of SNMP by the IETF. So, the IETF considersearlier versions as obsolete or historical.
  • 6. References ・Wikipedia http://en.wikipedia.org/wiki/Simple_Network_Managem ent_Protocol ・Internet Architecture http://www.soi.wide.ad.jp/class/20030002/slides/03/19.h tml ・Javvin http://www.javvin.com/protocolSNMP.html ・Adventnet http://www.adventnet.com/products/javaagent/java_snm p_agent_ds.html