* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Week 12
Wake-on-LAN wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Computer network wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Distributed firewall wikipedia , lookup
ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management 1 Last Week Network Security • Describe the most important security threats faced by distributed data processing • Compare conventional and public-key encryption • Discuss the application of encryption to network security • Discuss the use of IPSec to create a virtual private network 2 Topic 18 – Network Management Learning Objectives • Describe the key requirements that a network management system should satisfy • Describe an overview of the architecture and key elements of a network management system. • Describe SNMP and the difference between versions 1,2 and 3 3 ISO management Functional Areas • • • • • Fault management Accounting management Configuration and name management Performance management Security management 4 Fault Management • A fault is an abnormal condition that requires management attention (or action) to repair • A fault is usually indicated by failure to operate correctly or by excessive errors • Examples: communication link is physically cut; no signals can get through • Users expect quick and reliable resolution 5 Responding to Faults • When faults occur, it is critical to quickly: – Determine exactly where the fault is – Isolate the rest of the network from the failure so that it can continue to function without interference – Reconfigure or modify the network to minimize the effect of removing the failed component(s) – Repair or replace the failed components to restore the network to its initial state 6 User Requirements for Fault Management • Tolerant of occasional outages, but expect speedy resolution • Requires rapid and reliable fault detection and diagnostic management functions • Impact and duration of faults can be minimized with redundancy • Good communication with users about outages and faults is critical 7 Accounting Management Overview: • Internal charging for the use of network services. • Also used for monitoring the use of and planning network services. User Requirements: • What information is to be recorded where? • Privacy considerations. 8 Configuration Management • Concerned with: – initializing a network and gracefully shutting down part or all of the network – maintaining, adding, and updating the relationships among components and the status of components themselves during network operation • Operations on certain components should be able to be performed unattended • Network manager needs the capability to change the connectivity of network components • Users should be notified of configuration changes 9 Performance Management • What is the level of capacity utilization? • Is there excessive traffic? • Has throughput been reduced to unacceptable levels? • Are there bottlenecks? • Is response time increasing? Network managers need performance statistics to help them plan, manage, and maintain large networks 10 Security Management • Concerned with – generating, distributing, and storing encryption keys – monitoring and controlling access to networks – access to all or part of the network management information – collection, storage, and examination of audit records and security logs • Provides facilities for protection of network resources and user information • Network security facilities should be available for authorized users only 11 Network Management Systems • Collection of tools for network monitoring and control, integrated in these ways: – A single user-friendly operator interface for performing most or all network management tasks – A minimal amount of separate equipment • Consists of incremental hardware and software additions implemented among existing network components • Designed to view the entire network as a unified architecture, and provide regular feedback of status information to the network control center 12 Network Management System Architecture 13 Components of the NMS • Nodes run the Network Management Entity (NME) software • Network control host or manager runs the Network Management Application (NMA) • Other nodes are considered agents 14 Network Management Entity • Collection of software contained in each network node, devoted to the network management task • Performs the following tasks: – Collect statistics on communications and networkrelated activities. – Store statistics locally – Respond to commands from the network control center – Send messages to network control center when local conditions undergo a significant change 15 Simple Network Management Protocol (SNMP) • Originally developed for use as a network management tool for networks and internetworks operating TCP/IP. • A collection of specifications that include the protocol itself, the definition of a database, and associated concepts. • Network Management Model – – – – Management station Agent Management information base Network management protocol 16 17 Simple Network Management Protocol (SNMP) • Management station: a standalone device: – a set of management applications: data analysis, faulty recovery and so on – A user interface: monitor and control the network – A database: network management – Translate the network manger’s requirements into actual monitoring and control of remote elements in the network • • • Agent: key platforms( hosts, bridges, routers) +agent software Management information base (MIB): a collection of objects, which are data variables that represent the aspects of the managed agent. Network Management protocol: for linking the management station and agents 18 SNMPv1 Configuration 19 Role of SNMPv1 20 SNMPv2 • Released in 1992, revised in 1996 • Addressed functional deficiencies in SNMP • Accommodates decentralized network management • Improves efficiency of data transfer 21 Elements of SNMPv2 • Each "player" in the network management system maintains local database of network management information (MIB) • Standard defines information structure and allowable data types (SMI) • At least one system must be responsible for network management; others act as agents • Information exchanged using simple request/respond protocol, usually running over UDP 22 Structure of Management Information (SMI) • Defines framework within which a MIB can be defined and constructed – data types that can be stored – formal technique for defining objects and tables of objects – scheme for associating a unique identifier with each actual object in a system • Emphasis on simplicity and extensibility 23 SNMPv3 • Released in 1998, addressed security deficiencies in SNMP and SNMPv2 • Does not provide a complete SNMP capability; defines an overall SNMP architecture and a set of security capabilities for use with SNMPv2 24 Review • Key requirements that a network management system should satisfy • The architecture and key elements of a network management system. • SNMP and the difference between versions 1,2 and 3 25