* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download COS 338_day20
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Distributed firewall wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Airborne Networking wikipedia , lookup
COS 338 Day 20 DAY 19 Agenda Assignment 6 Due Lab 7 due next Monday Assignment 7 Posted Due Dec 1 Capstone Progress reports due Exam 3 on November 21 Chap 8&9, open book, open notes, 60 min, 25 M/c questions. Quiz can be taken from anywhere. Availability, time and password will be sent via WebCT e-mail Today we will do discuss network management 2 Network Management Chapter 10 Copyright 2004 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 5th edition Cost Figure 10-1: Network Demand Versus Budget Trends Money/ Demand User Demand Budget Time 5 Figure 10-2: Cost Issues The Importance of Costs Exploding demand Slow budget growth Falling hardware costs help, but software costs fall more slowly, and labor costs are rising Select the least expensive technology that will fully meet user needs 6 Figure 10-2: Cost Issues Non-Technology Costs Labor costs High, and unit labor costs are rising over time Rising Health Care costs are also a factor Often dominate total costs Carrier fees Recurring contractual charges 7 Figure 10-2: Cost Issues Total Cost of Ownership Fully configured cost of hardware Base price plus necessary options Often much higher than base price Fully configured cost of software Initial installation costs Vendor setup costs IT and end-user labor 8 Figure 10-2: Cost Issues Total Cost of Ownership Ongoing costs Upgrades Labor costs often exceed all other costs Immature products have very high labor costs Total cost of ownership (TCO): total of all costs over life span 9 Figure 10-3: Multiyear Cost Analysis: Total Cost of Ownership (TCO) Year 1 Year 2 Year 3 Year 4 $200,000 15,000 15,000 15,000 245,000 85,000 9,000 9,000 9,000 112,000 $100,000 10,000 10,000 10,000 130,000 Software Options 50,000 10,000 10,000 10,000 Technology Subtotal 435,000 44,000 44,000 44,000 567,000 Base Hardware Hardware Options Base Software Total 80,000 10 Figure 10-3: Multiyear Cost Analysis: Total Cost of Ownership (TCO) Year 1 Year 2 Year 3 Year 4 Total Planning and Development 75,000 75,000 Implementation 50,000 50,000 Ongoing IT Labor Ongoing User Labor Labor Subtotal Total 100,000 75,000 75,000 75,000 325,000 50,000 25,000 25,000 25,000 125,000 275,000 100,000 100,000 100,000 575,000 710,000 144,000 144,000 144,000 1,142,000 Note: The total cost of ownership is $1,142,000. 11 Network Simulation Figure 10-4: Network Simulation Simulation Build a model, study its implications More economical to simulate network alternatives than to build them Opnet GURU is a Simulation tool 13 Figure 10-4: Network Simulation What is: the existing situation Net 1 Net 4 Utilization in Peak Hour 95% Net 2 Net 3 Too high! Net 5 Net 6 14 Figure 10-4: Network Simulation What-if: See the Impact of a Change Net 1 Net 4 Added Router Net 2 Net 3 Added Link Est. Utilization in Peak Hour 70% Net 5 Net 6 15 Figure 10-4: Network Simulation Simulation Purposes Comparing alternatives to select the best one Base case and sensitivity analysis to see what will happen if the values of variables were varied over a range (+ or –- a certain amount) Anticipating problems, such as bottlenecks Planning for growth, to anticipate areas where more capacity is needed 16 Figure 10-4: Network Simulation Before the Simulation, Collect Data Data must be good Otherwise, GIGO (garbage in, garbage out) Collect data on the current network Forecast growth 17 Figure 10-4: Network Simulation The Process (Based on OPNET IT Guru) Add nodes to the simulation work area (clients, servers, switches, routers, etc.) Specify the topology with transmission lines (including line speeds) Configure the nodes and transmission lines (IP Time-to-Live value, etc.) Add applications, which generate traffic data 18 Figure 10-4: Network Simulation The Process Run the simulation for some simulated period of time Examine the output to determine implications Validate the simulation (compare with reality if possible to see if it is correct) What-if analysis Application performance analysis (OPNET ACE) 19 Figure 10-5: OPNET IT Guru Node Template 20 Figure 10-6: Configuring a Frame Relay CIR 21 Figure 10-7: Configured Simulation Model 22 Figure 10-8: What-If Analysis 23 IP Subnetting Figure 10-9: IP Subnetting Step Description 1 Total size of IP address (bits) 2 Size of network part assigned to firm (bits) 16 8 3 Remaining bits for firm to assign 16 24 4 Selected subnet/host part sizes (bits) 32 8/8 6/10 12/12 8/16 A firm is given its network size; it chooses its subnet size. Total is 32 bits, so big subnet size gives many subnets but few hosts. 25 Figure 10-9: IP Subnetting Step Description 5 Possible number of subnets (2^N-2) 254 62 4,094 254 (2^8-2) (2^6-2) (2^12-2) (2^8-2) 6 Possible number of hosts 254 1,022 4,094 65,534 per subnet (2^N-2) (2^8-2) (2^10-2) (2^12-2) (2^16-2) Subnet Calculator http://www.solarwinds.net/free/ 26 27 Directory Servers Store corporate information Hierarchical organization of content LDAP standard to access directory servers Figure 10-10: Hierarchical Directory Server Name Space Directory Server with Hierarchical Object Structure LDAP Request: Get e-mail.Brown.faculty. University of Waikiki (O) CN=Waikiki business.waikiki Astronomy Business (OU) (OU) LDAP Response: [email protected] O=organization OU=organizational unit CN=common name LDAP=Lightweight Directory Access Protocol CprSci (OU) Staff Faculty Routers Chun Brown Ochoa CN Brown E-Mail Ext [email protected] x6782 29 Configuring Routers Needed to set up new routers Needed to change operation of old routers Time consuming and an important skill Figure 10-11: Cisco Internetwork Operating System (IOS) Command Line Interface (CLI) Command Comment Router>enable[Enter] Router> is the prompt. The “>” shows that the user is in non-privileged mode. Enables privileged mode so that user can take supervisory actions. User must enter the enable secret. All commands end with [Enter]. Enter is not shown in subsequent commands. 31 Figure 10-11: Cisco Internetwork Operating System (IOS) Command Line Interface (CLI) Command Comment Router#hostname julia Prompt changes to “#” to indicate that user is in privileged mode. User gives the router a name, julia. julia#config t Enter configuration mode. The t is an abbreviation for terminal. 32 Figure 10-11: Cisco Internetwork Operating System (IOS) Command Line Interface (CLI) Command Comment julia(config)#int e0 Prompt changes to julia(config) to indicate that the user is in configuration mode. User wishes to configure Ethernet interface 0. (Router has two Ethernet interfaces, 0 and 1.) julia(config-if)#ip address 10.5.0.6 255.255.0.0 User gives the interface an IP address and a subnet mask. (Every router interface must have a separate IP address.) The subnet is 5. 33 Figure 10-11: Cisco Internetwork Operating System (IOS) Command Line Interface (CLI) Command Comment julia(config-if)#no shutdown This is an odd one. The command to shut down an interface is “shutdown”. Correspondingly, “no shutdown” turns the interface on. julia(config-if)# Ctrl-Z User types Ctrl-Z (the key combination, not the letters) to end the configuration of e0. julia(config)#int s1 User wishes to configure serial interface 1. (Router has two serial interfaces, 0 and 1.) 34 Figure 10-11: Cisco Internetwork Operating System (IOS) Command Line Interface (CLI) Command Comment julia(config-if)#ip address 10.6.0.1 255.255.0.0 User gives the interface an IP address and subnet mask. The subnet is 6. julia(config-if)#no shutdown Turns on s1. julia(config-if)# Ctrl-Z Ends the configuration of s1. julia# router rip Enables the Router Initiation Protocol (RIP) routing protocol. 35 Figure 10-11: Cisco Internetwork Operating System (IOS) Command Line Interface (CLI) Command Comment julia#disable Takes user back to non-privileged mode. This prevents anyone getting access to the terminal from making administrative changes to the router. julia> 36 Network Management Utilities Figure 10-12: Network Management Utilities Network management utilities are programs to help network managers administer the network Security Management tools can be used to make attacks Policies should limit these tools to certain employees and for certain purposes Firewalls block many network management tools to avoid attacks 38 Figure 10-12: Network Management Utilities Host Diagnostic Tools Network Setup Wizard works most of the time; need tools if it does not Testing the connection Open a connection to a website using a browser Ping a host to see if latency is acceptable 39 Figure 10-12: Network Management Utilities Host Diagnostic Tools Loopback testing and ipconfig/winipconfig Go to the command line Ping 127.0.0.1. This is the loopback interface (you ping yourself) For detailed information: ipconfig /all or winipconfig (older versions of Windows) 40 Figure 10-12: Network Management Utilities Host Diagnostic Tools Checking the NIC in Windows XP Right click on a connection and select Properties Under the name of the NIC, hit the Configuration button The dialog box that appears will show you the status of the NIC It also offers a Troubleshooting wizard if the NIC is not working 41 Figure 10-13: NIC Configuration Dialog Box 42 Figure 10-12: Network Management Utilities Host Diagnostic Tools Packet capture and display programs Capture data on individual packets Allows extremely detailed traffic analysis Look at individual packet data and summaries WinDUMP is a popular packet capture and display program on Windows 43 Figure 10-12: Network Management Utilities Command prompt>tcpdump www2.pukanui.com 7:50.10.500020 10.0.5.3.62030 > www2.pukanui.com.http: S 800000050:800000050(0) win 4086 <mss1460> 7:50.10.500020 is the time 10.0.5.3.62030 is the source host (62030 is the port number) www2.pukanui.com.http is the destination host (HTTP) WinDUMP from Ch. 8a 44 Figure 10-12: Network Management Utilities 7:50.10.500020 10.0.5.3.62030 > www2.pukanui.com.http: S 800000050:800000050(0) win 4086 <mss1460> S indicates that the SYN flag is set 800000050:800000050(0) Seq No and length Win 4086 is the window size (for flow control) <mss1460> is the option for maximum segment size (size of the TCP data field) WinDUMP from Ch. 8a 45 Figure 10-12: Network Management Utilities 7:50.10.500030 www2.pukanui.com.http > 10.0.5.3.62030 : S 300000030:300000030(0) ack 800000051 win 8760 <mss1460> SYN/ACK from the webserver 7:50.10.500040 10.0.5.3.62030 > www2.pukanui.com.http: . ack 1 win 4086 ACK to finish 3-way open WinDUMP from Ch. 8a 46 Figure 10-12: Network Management Utilities 7:50.10.500050 10.0.5.3.62030 > www2.pukanui.com.http: P 1:100(100) 7:50.10.500060 www2.pukanui.com.http > 10.0.5.3.62030 : . ack 101 win 9000 7:50.10.500070 www2.pukanui.com.http > 10.0.5.3.62030 : . 1:1000(999) 7:50.10.500080 10.0.5.3.62030 > www2.pukanui.com.http: . ack 1001 win 4086 WinDUMP from Ch. 8a 47 Figure 10-12: Network Management Utilities Host Diagnostic Tools Traffic summarization Shows statistical data on traffic going into and out of the host EtherPeek is a popular commercial traffic summarization program 48 Figure 10-14: EtherPeek Packet Capture and Summarization Program 49 Figure 10-12: Network Management Utilities Host Diagnostic Tools Connection analysis At the command line, Netstat shows active connections This can identify problem connections Spyware running on Port 3290 50 Figure 10-12: Network Management Utilities Route Analysis Tools To test the route to another host Ping tests gives the latency of a whole route Tracert gives latencies to router along the path Ping 275 ms 250 ms Tracert 25 ms 75 ms 225 ms 150 ms (Problem?) 51 Figure 10-12: Network Management Utilities Network Mapping Tools To understand how the network is organized Discovering IP addresses with active devices Fingerprinting them to determine their operating system (client, server, or router) A popular network mapping program is Nmap (Figure 10-4) 52 Figure 10-12: Network Management Utilities IP Range to Scan Type of Scan Identified Host and Open Ports 53 Figure 10-16: Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) Standard for managing remote devices in a network Collects information from remote devices to give the network administrator an overview of the network Optionally, allows the network administrator to reconfigure remote devices Potential for strong labor cost savings 54 Figure 10-16: Simple Network Management Protocol (SNMP) Network Management Software (Manager) Managed Device Manager manages multiple managed devices from a central location RMON Probe 55 Figure 10-16: Simple Network Management Protocol (SNMP) Network Management Software (Manager) Network Management Agent (Agent), Objects Network Management Agent (Agent), Objects Manager talks to an network management agent on each managed device RMON Probe 56 Figure 10-16: Simple Network Management Protocol (SNMP) Network Management Software (Manager) Network Management Agent (Agent), Objects Network Management Agent (Agent), Objects RMON (remote monitoring) probe is a special agent that collects data about multiple devices in a region of in the network. It is like a local manager that can be queried by the main manager. RMON Probe 57 Figure 10-16: Simple Network Management Protocol (SNMP) Network Management Software (Manager) Management Information Base (MIB) Management Information Base (MIB) MIB stores data about devices. MIB on manager stores all. MIB on device stores local information Management Information Base (MIB) RMON Probe 58 Figure 10-16: Simple Network Management Protocol (SNMP) Network Management Software (Manager) Management Information Base (MIB) Simple Network Management Protocol (SNMP) Management Information Base (MIB) Command (Get, Set, etc.) Response Management Information Base (MIB) Trap RMON Probe 59 Figure 10-17: SNMP Object Model SNMP Object Model Management Information Base (MIB) The MIB database schema Defines objects (parameters) about which information is stored for each managed device SNMP System Objects System name System description System contact person System uptime (since last reboot) 60 Figure 10-17: SNMP Object Model SNMP IP Objects Management Information Base (MIB) Forwarding (for routers). Yes if forwarding (routing), No if not Subnet mask Default time to live Traffic statistics Number of discards because of resource limitations 61 Figure 10-17: SNMP Object Model SNMP IP Objects (Continued) Management Information Base (MIB) Number of discards because could not find route Number of rows in routing table Rows discarded because of lack of space Individual row data in the routing table 62 Figure 10-17: SNMP Object Model SNMP TCP Objects Management Information Base (MIB) Maximum / minimum retransmission time Maximum number of TCP connections allowed Opens / failed connections / resets Segments sent Segments retransmitted Errors in incoming segments No open port errors Data on individual connections (sockets, states) 63 Figure 10-17: SNMP Object Model SNMP UDP Objects Error: no application on requested port Traffic statistics Management Information Base (MIB) SNMP ICMP Objects Number of errors of various types 64 Figure 10-17: SNMP Object Model Management Information Base (MIB) SNMP Interface Objects (One per Port) Type (e.g., 69 is 100Base-FX; 71 is 802.11) Status: up / down / testing Speed MTU (maximum transmission unit—the maximum packet size) Traffic statistics: octets, unicast / broadcast / multicast packets Errors: discards, unknown protocols, etc. 65 Remote Switch and Router Management Figure 10-12: Network Management Utilities Remote Switch and Router Management Telnet Web interfaces SSH TFTP Saves money compared to traveling to device 67 Figure 10-18: Telnet, Web Management, SSH, and TFTP Telnet Remotely log into managed device as a dumb terminal Poor security Weak password authentication Passwords are sent in the clear, making them vulnerable to sniffers No encryption of traffic 68 Figure 10-18: Telnet, Web Management, SSH, and TFTP Web Interfaces Managed device contains a webserver Administrator connects to the managed device with a browser Can use SSL/TLS but typically does not 69 Figure 10-18: Telnet, Web Management, SSH, and TFTP SSH Secure shell protocol Similar to Telnet but highly secure Widely installed on Unix computers (including Linux computers) Software must be added to Windows devices 70 Figure 10-18: Telnet, Web Management, SSH, and TFTP TFTP Trivial File Transfer Protocol Similar to file transfer program but simpler Simple enough to implement on switches and routers Often used to download configurations to a switch or router from a server 71 Figure 10-18: Telnet, Web Management, SSH, and TFTP TFTP No password is needed Can be used by hackers to download attack programs Poor security makes TFTP very dangerous 72 Traffic Management Figure 10-19: Traffic Management Methods Traffic Management Capacity is expensive; it must be used wisely Especially in WANs 74 Figure 10-19: Traffic Management Methods Traditional Approaches Overprovisioning In Ethernet, install much more capacity than is needed most of the time This is wasteful of capacity Does not require much ongoing management labor 75 Figure 10-19: Traffic Management Methods Traditional Approaches Priority In Ethernet, assign priority to applications based on sensitivity to latency In momentary periods of congestion, send highpriority frames through Substantial ongoing management labor 76 Figure 10-19: Traffic Management Methods Traditional Approaches QoS Reservations In ATM, reserve capacity on each switch and transmission line for an application Allows strong QoS guarantees for voice traffic Highly labor-intensive Data gets the scraps—capacity that is not reserved for voice 77 Figure 10-19: Traffic Management Methods Traffic Shaping The Concept Control traffic coming into the network at access switches Filter out unwanted applications Give a maximum percentage of traffic to other applications 78 Figure 10-19: Traffic Management Methods Traffic Shaping Advantages and Disadvantages Traffic shaping alone reduces traffic coming into the network to control costs Very highly labor intensive Creates political battles (as do priority and QoS reservations to a lesser degree) 79 Topics Covered Topics Covered Cost Exploding demand, slow budget growth Hardware, software, labor costs Fully-configured hardware versus base prices Total cost of ownership: cost over entire life cycle Network Simulation Model the network on a computer Explore alternatives Cheaper than building alternatives 81 Topics Covered IP Subnet Planning Organization is given its network part Divides remaining bits of IP address into subnet and host part Must balance number of subnets with hosts per subnet Directory Servers Hierarchical data storage LDAP 82 Topics Covered Configuring Routers Time-consuming; important skill Cisco IOS is the dominant router operating system Command-line interface (CLI) Network Management Utilities Both network managers and hackers love them Host diagnostic tools. Is the connection working? 127.0.0.1 Windows XP: Connection Properties 83 Topics Covered Network Management Utilities Packet capture and display programs Traffic summarization program (Etherpeek) Netstat to show active connections Route analysis: Ping and Tracert Network mapping tools (nmap) 84 Topics Covered Simple Network Management Protocol (SNMP) Manager, managed devices, agents Get and set commands MIB RMON probe SNMP object model (MIB schema) 85 Topics Covered Remote Switch and Management Utilities Saves money compared to traveling to device Telnet Web interfaces SSH TFTP 86 Topics Covered Traffic Management Capacity is expensive on WANs Overprovisioning is too wasteful on WANs Priority is good but expensive to manage QoS reservations only allow strong guarantees for some services; rest get the scraps Traffic shaping: only select certain type of traffic Drop certain traffic or limit it to a certain amount 87