1 / 18

Advanced Network Management

Advanced Network Management. Prof. Chadi Assi assi@ciise.concordia.ca 1425 René Lévesque Blvd. CB-410-13. Text Books and References. Network Management: Principles and Practice: Mani Subramanian, Addison Wesley, ISBN: 0-201-35742-9 SNMP, SNMPv2, SNMPv3 and RMON1 and 2:

shira
Download Presentation

Advanced Network Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Advanced Network Management Prof. Chadi Assi assi@ciise.concordia.ca 1425 René Lévesque Blvd. CB-410-13

  2. Text Books and References • Network Management: Principles and Practice: Mani Subramanian, Addison Wesley, ISBN: 0-201-35742-9 • SNMP, SNMPv2, SNMPv3 and RMON1 and 2: William Stallings, 3rd edition, Addison Wesley, ISBN: 0-201-48534-6 • Network Management: A Practical Perspective Leinwand, A. and Fang K., Addison Wesley • Essential SNMP Douglas Mauro and Kevin Schmidt, O’Reilly online version: http://www.unix.org.ua/orelly/networking_2ndEd/snmp/ • Other RFCs and Research papers

  3. Course Outline • Network Management: Principles, Standards and Models. • Computer Networks and the Internet • Application, Transport and Network layer • Network Management Protocols and Abstract Syntax Notation One (ASN.1). • Simple Network Management Protocol (SNMP) • Structure of Management Information (SMI), Management Information Base (MIB). • SNMPv2 • SNMPv3 • Remote Monitoring (RMON), RMON 1 and 2.

  4. Course Outline • OSI Systems management and Telecommunications Management Network (TMN). • Network Management Applications (Configuration, Performance, Fault and Security management). • Distributed Management Framework (management by delegation, mobile agent based management, etc.) • CORBA based management, web based management, JMX and DMTF. • ATM Network Management.

  5. Course Outline • Marking Scheme: • Midterm1         35% • Midterm2         35% • Project                         25% • Homeworks 5% • More info:www.ciise.concordia.ca/~assi/courses/inse7120.htm

  6. Background • Today’s “Information Infrastructure” (or simply the Internet) is increasingly growing up • large number of interconnected heterogeneous sub-networks and a wide range of distributed applications (100s or 1000s of interacting hardware/software components) • Other complex systems requiring monitoring, control • jet airplane • nuclear power plant • Others • In such a large network, many things can go wrong • therefore disabling the network or a portion of it and degrading performance to an unacceptable level!

  7. Background • During the old days, a network can be managed by using only human efforts! • In a small system, running few “pings” may help locating the problem • As the Internet becomes a large global infrastructure, automated network management tools are essential • Standardized tools that can be used across a broad spectrum of product types are also needed • Therefore, a network management system (NMS) is a collection of tools for network monitoring and control • Just as an airplane cockpit allows a pilot to monitor, control, analyze, configure, etc.

  8. Network Management Failure of Interface Card • A network admin by monitoring and analyzing network traffic may detect problems in any interface card and replace it • e.g., increase in checksum errors in frames sent out by this interface; Host Monitoring • A network admin periodically checks to see if all hosts are operational

  9. Network Management Monitoring traffic/resource deployment • By monitoring link utilization, a network admin may determine system bottleneck and provision higher bandwidth link instead, to avoid congestion

  10. Network Management Rapid changes in routing tables • If detected may prevent instabilities in routing and hence prevent a network from going down Intrusion detection • Network admin requests to be notified when traffic is destined to/arrives from a suspicious source • Detect the existence of a certain type of traffic (e.g., security attacks)

  11. What is Network Management?* "Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost." *T.Saydam, T. Magendaz “From Networks and Network Management into Service and Service Management” Journal of Networks and System Management, Vol.4, No.4, Dec. 1996

  12. What is Network Management? • ISO (International Organization for Standardization) has created a network management model. 5 areas of network management are classified • Performance Management • Fault Management • Configuration Management • Security Management • Accounting Management • This classification has gained broad acceptance by vendors of both standardized and proprietary NMS

  13. Performance Management • Two functional categories • Monitoring (ability to monitor and track activities on the network) • Controlling (ability to make adjustments to improve network performance). • Measuring Performance • Throughput (whether reduced to unacceptable level!) • Response time (i.e. network delays) • Utilization • Error rates (identify bottlenecks) • Availability Goal: Quantify, measure, report, analyze, and control the performance of different network components (such as routers, hosts, as well as end to end abstractions, such as a path through the network)

  14. Fault Management Faults are to be distinguished from Errors • A fault is an abnormal condition and requires management attention to repair (e.g. link cut) • An Error is a single event! (e.g. single bit error on a line) Goal: Log, detect, and respond to fault conditions in the network Immediate* handling of transient network failures (link, host, router hardware or software outages) *performance management takes longer term view in the face of varying traffic demands and occasional network device failures.

  15. Configuration Management Consists of the following steps: • Gather information about current network, maintain an up-to-date inventory of all network components • Use that data to modify the configuration of the network device (reconfiguration*) Goal: Allow a network manager to track which devices are on the network and the hardware and software configurations of these devices. * Reconfiguration of a network is often desired in response to performance evaluation or in support of network upgrade, fault recovery, or security checks.

  16. Security Management Security at different levels • Physical & Data Link Levels  Encryption • Network Level  packet filters • Application Level  (host, user and key) authentication • Popular Level  Firewalls & VPNs Goal: Control access to network resources according to well defined policy. Identifying sensitive information (e.g., network management information) and protecting it

  17. Accounting Management • A network manager should track the use of network resources • A user may be abusing his access privilege and burdening the network at the expense of other users. (e.g., a user may be violating his service contract) • Planning for network growth Goal: Specify, log, and control user and device access to network resources …usage quotas, usage-based charging, the allocation of resource-access privileges… …Accounting reports should be generated periodically

  18. managing entity data data data data data agent agent agent agent Infrastructure for Network Management definitions: managing entity managed devices contain managed objects whose data is gathered into a Management Information Base (MIB) managed device network management protocol managed device managed device managed device

More Related