Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Management Architecture and Standards IACT 418 IACT 918 Corporate Network Planning Gene Awyzio Spring 2001 Objectives Recognise the protocols used in management of a telecommunications network with reference to the OSI stack, in particular SNMP ASN 1 MIB Identify databases and their use to manage the telecommunications network Objectives Understand what is involved in change control, configuration management and configuring a network Demonstrate appropriate practical and problem solving skills The OSI Stack Proposed by the International Organisation for Standardisation (ISO) and other standards bodies Its a layered approach to network protocols involving encapsulation of packets at each level of the stack and the sub-layers The OSI Stack Each layer has its own functionality All layers are likely present at the end user’s host machine or Front End processor (FEP) or customers equipment, but … The OSI Stack Inside the network you may have only the first two or three layers A router mostly has up to the network layer A bridge uses the data link layer (sublayers LLC [Logical Link Control] and MAC [Medium Access Control]) The network management protocols operate at the APPLICATION layer, like TELNET and FTP The OSI Stack 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical The OSI Stack Layer Name Encapsulation Component 7 Application Data Software 6 Presentation Data Software 5 Session Data Software 4 Transport Segments Router 3 Network Packets, Datagrams Router 2 Data Link Frames NIC. ( LLC & MAC ) 1 Physical Bits NIC.( Physical ) Hub, Repeater. DCE & DTE Network Management Software Architecture A network management system consists of incremental hardware and software additions (scalable) implemented among existing network elements The software used to accomplish the network management tasks resides in the host computers and communications processors: Front End Processors (FEP) terminal cluster controllers Bridges Routers Network Management Software Architecture A network management system allows viewing of the entire network as a unified architecture: With addresses and labels assigned to each network element With specific attributes of each network element and its connectivity known to the system The active elements of the network provide regular feedback of status information to the network control centre Network Management Software Architecture A generic network management structure might be as given in the following figure: Network Management Software Architecture NMA NME Appl Comm NME Appl Comm NMA NMA NME Comm NME Appl Comm NMA OS Network Management Software Architecture Each node contains a collection of software devoted to an appropriate network management task Referred to as the network management entity ( NME) Network Management Software Architecture At least one (and probably more ) host in the network is designated the network control host or manager As well as the software for a NME, these hosts include extra software called the network management application (NMA) Distributed Network Management Centralised network management systems are devolving into distributed network management systems Due to the same factors are involved that have lead to the distributed networks Low cost of hardware / PC’s High powered PC’s Proliferation of LAN’s Distributed Network Management A distributed management system replaces the single network control centre with interoperable workstations located on LANs distributed throughout the organisation This gives departmental (local) level managers the tools they need to maintain responsive networks, systems and applications for their local end users Distributed Network Management But… how do we avoid anarchy? Distributed Network Management Management clients (PCs, workstations) Network Management server Management Application Management server Management Application MIB MIB Network Network Element Manager Element Manager Network Resources (servers, routers, hosts) with management agents Distributed Network Management The distributed system has the following benefits: Network management traffic is minimised Distributed management offers greater scalability adding capability only involves adding another workstation in the appropriate location The use of multiple networked stations eliminates the single point of failure represented by having only one central manager Proxies Proxies may be required when: Older network elements exist in the network that do not use the protocols implemented by the management servers Small systems that would be unduly burdened (too many management packets would flow on the system) to support a full blown NME (agent) Modems and multiplexers which do not support additional software / agents SNMP The term Simple Network Management Protocol (SNMP) actually refers to a collection of specifications that include: the protocol itself the definition of data structures associated concepts (eg proxies) We will now look at a brief overview of the SNMP setup, the most prolific method of network management today The History SNMP’s development follows a similar pattern to the development of TCP/IP ARPANET evolved during 1970’s, into a set of protocols approved by the internet architecture board (IAB) {www.iab.Org} The History Standards were issued as RFC’s (Request for comment) and were adopted by the military in the United States in their procurement policies, forming the core of the TCP/IP protocol suite, which was adopted by vendors for non military activities, and grew dramatically during the 1980’s The History Many still predict that OSI standards will replace TCP/IP, but this has not occurred at this time. Why? Possible reasons are: TCP/IP suite is mature, and adapts to interoperability issues via the IAB / IETF TCP/IP provides a high level of functionality - from the majority of users points of view The international standards have been slowly developed (OSI), while providing a richer functionality they will also require more effort in implementation and conformance testing The History As TCP/IP developed little thought was given to network management, especially in the early days where many programmers and protocol designers would modify the network as required Through the late 1970’s there were still no network management protocols, but the one tool used for management that was available was the Internet Control Message Protocol (ICMP) Internet Control Message Protocol: ICMP Provides a means for transferring control messages from routers and other hosts to a host to provide feedback about problems in the networking environment Most useful message is the echo / echo reply message pair - provides a mechanism to test if communication is possible between two network elements / entities on the TCP/IP network Also provides a mechanism for measuring delay across the connection using time stamp and time stamp reply Internet Control Message Protocol: The ICMP messages can be used with IP header options such as source routing and record route ( a trace route feature) to develop simple but powerful management tools The most useful example of this is the widely used PING (Packet INternet Groper) Internet Control Message Protocol: PING can perform a variety of functions Determine if a particular network element can be addressed Verifying that a network can be addressed Observe variations in round trip times Observe datagram loss rates, which can help isolate points of congestion and high error rates / points of failure Internet Control Message Protocol: This was satisfactory up until the late 1980’s when exponential growth in the internet required more powerful network management capability In November 1987, the Simple Gateway Monitoring Protocol (SGMP) was issued, providing a way to monitor gateways on the internet Internet Control Message Protocol: At this time three approaches were proposed or emerged: High Level Entity Management System (HEMS) Simple Network Management Protocol (SNMP) CMIP (Common Management Information Protocol from OSI) over TCP /IP (CMOT Internet Control Message Protocol: In 1988 the IAB reviewed these proposals and approved SNMP for a short term solution and CMOT as the long range solution Both SNMP and CMOT were to use the same database of managed objects There would be only a single Structure of Management Information (SMI - the basic format conventions for objects) Management Information Base (MIB - the actual structure or schema of the database) Internet Control Message Protocol: In 1989, after it was found impractical to have the same set of managed objects, the IAB relaxed its condition of common SMI / MIB and allowed the two protocols to develop independently Freedom from OSI constraints led to rapid SNMP development SNMP Related Standards Three foundation specifications of SNMP are: Structure and Identification of Management Information for TCP/IP-based networks (RFC 1155) Management Information Base for Network Management of TCP/IP-based Internets: MIB-II (RFC 1213) Simple Network Management Protocol (RFC 1157) The SNMP Network Management Architecture The model used for network management of TCP/IP includes the key elements: Management station Management agent Management Information Base Network management protocol Management Station Typically a stand-alone network element, but may be a capability on a shared system (eg mainframe) Serves as the network interface for the human network manager into the network management system Management Station As a minimum the network management station will have: A set of management applications An interface The capability of translating the network manager's requirements into the actual monitoring and control of remote elements in the network A database of information extracted from the MIBs of all the managed entities in the network SNMP standards only cover points 3 and 4 Management agent The management agent Responds to requests for information and actions from the management station May asynchronously provide the management station with important but unsolicited information Managed objects Resources in the network may be managed by representing these resources as objects Each object is a data variable that represents one aspect of the managed agent The collection of objects is referred to as a Management Information Base (MIB) The MIB functions as a collection of access points at the agent for the management station Management Information Base The objects are standardized across systems of a particular class For example, a common set of objects is used for the management of various bridges A management station performs the monitoring function by retrieving the value of MIB objects Management Information Base A management station can Cause an action to take place at an agent change the configuration settings at an agent by modifying the value of specific variables The management station and agents are linked by a network management protocol SNMP - the Management Protocol Used for TCP/IP SNMP includes the following key capabilities: Get Set Trap The standards do not specify The number of management stations The ratio of management stations to agents SNMP - the Management Protocol Used for TCP/IP In general, it is prudent to have at least two systems capable of performing the management station functions As SNMP is simple it can handle many agents SNMP is designed to be an application-level protocol that is part of the TCP/IP protocol suite which operates over the user datagram protocol (UDP) SNMP - the Management Protocol Used for TCP/IP SNMP - the Management Protocol Used for TCP/IP SNMP - the Management Protocol Used for TCP/IP From a management station, three types of SNMP messages are issued on behalf of a management application: GetRequest GetNextRequest SetRequest SNMP - the Management Protocol Used for TCP/IP The first two are two variations of the get function All three messages are acknowledged by the agent in the form of a GetResponse message, which is passed up to the management application SNMP - the Management Protocol Used for TCP/IP An agent may issue a trap message in response to an event that affects the MIB and the underlying managed resources - this is received by the manager SNMP relies on UDP, which is connectionless so SNMP is itself connectionless ie each exchange is a separate transaction between a management station and an agent Trap - Directed Polling Preferred strategy is: A management station can poll all of the agents it knows for some key information Once the baseline is established, the management station refrains from polling Each agent is responsible for notifying the management station of any unusual event Trap - Directed Polling These events are communicated in SNMP messages known as traps Once a management station is alerted to an exception condition, it chooses to take the appropriate action Trap - Directed Polling Trap-directed polling can result in substantial savings of Network capacity Agent processing time Reduces unnecessary polling of agents by managers thus reducing management induced network traffic Limitations of SNMP SNMP may not be suitable for the management of very large networks Each agent needs to be polled and generates trap traffic SNMP is not suited to retrieving large volumes of data such as a entire routing table SNMP traps are unacknowledged meaning the agent generating the trap does not know if the manager received it Limitations of SNMP Basic SNMP standard only provides trivial authentication SNMP does not directly support imperative commands with parameters, conditions, status and results Limitations of SNMP SNMP MIB model is limited not supporting sophisticated management queries based on object values or types SNMP does not support manager to manager communications ie no mechanism for one manager to find out about another network managers, managed network elements