SlideShare ist ein Scribd-Unternehmen logo
1 von 48
1
Upon completion you will be able to:
Network Management:
SNMP
• Understand the SNMP manager and the SNMP agent
• Understand the roles of SMI and MIB in network management
• Be familiar with SMI object attributes and encoding methods
• Know how an MIB variable is accessed
• Be familiar with the SNMP PDU and format
Objectives
2
CONCEPT
SNMP defines a manager, usually a host,
that controls and monitors a set of agents,
usually routers.
The topics discussed in this section include:
Managers and Agents
3
Figure SNMP concept
4
MANAGEMENT COMPONENTS
SNMP requires the use of two other protocols: Structure of
Management Information (SMI) and Management
Information Base (MIB). Network management on the
Internet is done through the cooperation of SNMP, SMI, and
MIB.
The topics discussed in this section include:
Role of SNMP
Role of SMI
Role of MIB
An Analogy
An Overview
5
Components of network management on the
Internet
6
SNMP defines the format of packets
exchanged between a manager and an
agent. It reads and changes the status
(values) of objects (variables) in
SNMP packets.
Note:
7
SMI defines the general rules for naming
objects, defining object types (including
range and length), and showing how to
encode objects and values. SMI defines
neither the number of objects an entity
should manage, nor names the objects to
be managed nor defines the association
between the objects and their values.
Note:
8
MIB creates a collection of named
objects, their types, and their
relationships to each other in an entity
to be managed.
Note:
9
We can compare the task of network
management to the task of writing a
program.
❏ Both tasks need rules. In network management
this is handled by SMI.
❏ Both tasks need variable declarations. In network
management this is handled by MIB.
❏ Both tasks have actions performed by statements.
In network management this is handled by SNMP.
Note:
10
Figure Management overview
11
SMI
SMI is a component used in network
management. It names objects, defines the
type of data that can be stored in an object,
and shows how data can be encoded for
transmission over the network
The topics discussed in this section include:
Name
Type
Encoding Method
12
Figure Object attributes
13
Figure Object identifier
14
All objects managed by SNMP are
given an object identifier.
The object identifier always starts with
1.3.6.1.2.1.
Note:
15
Figure Data type
16
Table Data types
17
Figure Conceptual data types
18
Figure Encoding format
19
Table 21.2 Codes for data types
20
Figure 21.9 Length format
21
Figure 21.10 shows how to define INTEGER 14.
Example 1
See Next Slide
22
Figure 21.10 Example 1, INTEGER 14
23
Example 2
See Next Slide
Figure 21.11 shows how to define the OCTET STRING
“HI.”
24
Figure 21.11 Example 2, OCTET STRING “HI”
25
Figure 21.12 shows how to define ObjectIdentifier
1.3.6.1 (iso.org.dod.internet).
Example 3
See Next Slide
26
Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1
27
Figure 21.13 shows how to define IPAddress
131.21.14.8.
Example 4
See Next Slide
28
Figure 21.13 Example 4, IPAddress 131.21.14.8
29
21.4 MIB
MIB is a component used in network management. Each agent has its
own MIB, a collection of all the objects that the manager can manage.
The topics discussed in this section include:
Accessing MIB Variables
Lexicographic Ordering
30
Figure 21.14 mib-2
31
Figure 21.15 udp group
32
Figure 21.16 udp variables and tables
33
Figure 21.17 Indexes for udpTable
34
Figure 21.18 Lexicographic ordering
35
21.5 SNMP
SNMP is an application program that allows 1) a manager to retrieve the
value of an object defined in an agent; 2) a manager to store a value in
an object defined in an agent; and 3) an agent to send an alarm message
about an abnormal situation to the manager
The topics discussed in this section include:
PDUs
Format
36
Figure 21.19 SNMP PDUs
37
Figure 21.20 SNMP PDU format
38
Table 21.3 Types of errors
39
21.6 MESSAGES
A message in SNMP is made of four elements: version, header, security
parameters, and data (which includes the encoded PDU).
40
Figure 21.21 SNMP message
41
Table 21.4 Codes for SNMP messages
42
In this example, a manager station (SNMP client) uses the
GetRequest message to retrieve the number of UDP datagrams
that a router has received. There is only one VarBind entity.
The corresponding MIB variable related to this information is
udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0.
The manager wants to retrieve a value (not to store a value), so
the value defines a null entity. Figure 21.22 shows the
conceptual view of the packet showing the hierarchical nature
of sequences. We have used white and color boxes for the
sequence and a gray one for the PDU.
Example 5
See Next Slide
43
The VarBind list has only one VarBind. The variable is of type
06 and length 09. The value is of type 05 and length 00. The
whole is a sequence of length 0D (13). The VarBind list is also
a sequence of length 0F (15). The GetRequest PDU is of length
1D (29). Now we have three OCTET STRINGs related to
security parameter, security model, and flags. Then we have
two integers defining maximum size (1024) and message ID
(64). The header is a sequence of length 12, which we left
blank for simplicity. There is one integer, version (version 3).
The whole message is a sequence of 52 bytes. Figure 21.23
shows the actual message sent by the manager station (client)
to the agent (server).
Example 5
See Next Slide
44
Figure 21.22 Example 5
45
Figure 21.23 GetRequest message
46
21.7 UDP PORTS
SNMP uses the services of UDP on two well-known ports, 161 and 162.
The well-known port 161 is used by the server (agent), and the well-
known port 162 is used by the client (manager).
47
Figure 21.24 Port numbers for SNMP
48
21.8 SECURITY
The main difference between SNMPv3 and SNMPv2 is the enhanced
security. SNMPv3 provides two types of security: general and specific.
SNMPv3 provides message authentication, privacy, and manager
authorization.

Weitere ähnliche Inhalte

Was ist angesagt?

network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
ashutosh rai
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
Thanveen
 

Was ist angesagt? (20)

Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
 
SNMP
SNMPSNMP
SNMP
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
 
SNMP
SNMPSNMP
SNMP
 
Icmp
IcmpIcmp
Icmp
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Syslog
SyslogSyslog
Syslog
 
EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11EC8004 wireless networks unit 1 IEEE802.11
EC8004 wireless networks unit 1 IEEE802.11
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
It 3-icmp-igmp
It 3-icmp-igmpIt 3-icmp-igmp
It 3-icmp-igmp
 
Igmp presentation
Igmp presentationIgmp presentation
Igmp presentation
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
CCNA Chapter1
CCNA Chapter1CCNA Chapter1
CCNA Chapter1
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 

Andere mochten auch

Linux: Beyond ls and cd
Linux: Beyond ls and cdLinux: Beyond ls and cd
Linux: Beyond ls and cd
jacko91
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
Praveen Mathews
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by Cisco
Febrian ‎
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
koolkampus
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Andere mochten auch (20)

SNMP
SNMPSNMP
SNMP
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Network Management
Network ManagementNetwork Management
Network Management
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
Protocolo SNMP
Protocolo SNMPProtocolo SNMP
Protocolo SNMP
 
Linux: Beyond ls and cd
Linux: Beyond ls and cdLinux: Beyond ls and cd
Linux: Beyond ls and cd
 
SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
SNMP
SNMPSNMP
SNMP
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Snmp protocol
Snmp protocolSnmp protocol
Snmp protocol
 
Inter as vpn option c
Inter as vpn option c Inter as vpn option c
Inter as vpn option c
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by Cisco
 
Linux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileLinux fundamental - Chap 03 file
Linux fundamental - Chap 03 file
 
Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Ähnlich wie Snmp

FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
useonlyfortech140
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 

Ähnlich wie Snmp (20)

Ch28
Ch28Ch28
Ch28
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
 
ch28 (1).ppt
ch28 (1).pptch28 (1).ppt
ch28 (1).ppt
 
CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.ppt
 
ch28.ppt
ch28.pptch28.ppt
ch28.ppt
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Ch23
Ch23Ch23
Ch23
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmp
 
Snmp
SnmpSnmp
Snmp
 
I010315760
I010315760I010315760
I010315760
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
Chapter 9 v6.0
Chapter 9 v6.0Chapter 9 v6.0
Chapter 9 v6.0
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
 
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery BoardProgramming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
 

Mehr von bhavanatmithun (13)

Code optimisation presnted
Code optimisation presntedCode optimisation presnted
Code optimisation presnted
 
computer networks
computer networkscomputer networks
computer networks
 
Deadlock
DeadlockDeadlock
Deadlock
 
krisibhavan site
krisibhavan sitekrisibhavan site
krisibhavan site
 
User server interaction
User server interactionUser server interaction
User server interaction
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
HTTP
HTTPHTTP
HTTP
 
FTP
FTPFTP
FTP
 
DNS
DNSDNS
DNS
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Group communication
Group communicationGroup communication
Group communication
 
Group communication
Group communicationGroup communication
Group communication
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Snmp

  • 1. 1 Upon completion you will be able to: Network Management: SNMP • Understand the SNMP manager and the SNMP agent • Understand the roles of SMI and MIB in network management • Be familiar with SMI object attributes and encoding methods • Know how an MIB variable is accessed • Be familiar with the SNMP PDU and format Objectives
  • 2. 2 CONCEPT SNMP defines a manager, usually a host, that controls and monitors a set of agents, usually routers. The topics discussed in this section include: Managers and Agents
  • 4. 4 MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: Structure of Management Information (SMI) and Management Information Base (MIB). Network management on the Internet is done through the cooperation of SNMP, SMI, and MIB. The topics discussed in this section include: Role of SNMP Role of SMI Role of MIB An Analogy An Overview
  • 5. 5 Components of network management on the Internet
  • 6. 6 SNMP defines the format of packets exchanged between a manager and an agent. It reads and changes the status (values) of objects (variables) in SNMP packets. Note:
  • 7. 7 SMI defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. SMI defines neither the number of objects an entity should manage, nor names the objects to be managed nor defines the association between the objects and their values. Note:
  • 8. 8 MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. Note:
  • 9. 9 We can compare the task of network management to the task of writing a program. ❏ Both tasks need rules. In network management this is handled by SMI. ❏ Both tasks need variable declarations. In network management this is handled by MIB. ❏ Both tasks have actions performed by statements. In network management this is handled by SNMP. Note:
  • 11. 11 SMI SMI is a component used in network management. It names objects, defines the type of data that can be stored in an object, and shows how data can be encoded for transmission over the network The topics discussed in this section include: Name Type Encoding Method
  • 14. 14 All objects managed by SNMP are given an object identifier. The object identifier always starts with 1.3.6.1.2.1. Note:
  • 19. 19 Table 21.2 Codes for data types
  • 21. 21 Figure 21.10 shows how to define INTEGER 14. Example 1 See Next Slide
  • 22. 22 Figure 21.10 Example 1, INTEGER 14
  • 23. 23 Example 2 See Next Slide Figure 21.11 shows how to define the OCTET STRING “HI.”
  • 24. 24 Figure 21.11 Example 2, OCTET STRING “HI”
  • 25. 25 Figure 21.12 shows how to define ObjectIdentifier 1.3.6.1 (iso.org.dod.internet). Example 3 See Next Slide
  • 26. 26 Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1
  • 27. 27 Figure 21.13 shows how to define IPAddress 131.21.14.8. Example 4 See Next Slide
  • 28. 28 Figure 21.13 Example 4, IPAddress 131.21.14.8
  • 29. 29 21.4 MIB MIB is a component used in network management. Each agent has its own MIB, a collection of all the objects that the manager can manage. The topics discussed in this section include: Accessing MIB Variables Lexicographic Ordering
  • 32. 32 Figure 21.16 udp variables and tables
  • 33. 33 Figure 21.17 Indexes for udpTable
  • 35. 35 21.5 SNMP SNMP is an application program that allows 1) a manager to retrieve the value of an object defined in an agent; 2) a manager to store a value in an object defined in an agent; and 3) an agent to send an alarm message about an abnormal situation to the manager The topics discussed in this section include: PDUs Format
  • 37. 37 Figure 21.20 SNMP PDU format
  • 38. 38 Table 21.3 Types of errors
  • 39. 39 21.6 MESSAGES A message in SNMP is made of four elements: version, header, security parameters, and data (which includes the encoded PDU).
  • 41. 41 Table 21.4 Codes for SNMP messages
  • 42. 42 In this example, a manager station (SNMP client) uses the GetRequest message to retrieve the number of UDP datagrams that a router has received. There is only one VarBind entity. The corresponding MIB variable related to this information is udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve a value (not to store a value), so the value defines a null entity. Figure 21.22 shows the conceptual view of the packet showing the hierarchical nature of sequences. We have used white and color boxes for the sequence and a gray one for the PDU. Example 5 See Next Slide
  • 43. 43 The VarBind list has only one VarBind. The variable is of type 06 and length 09. The value is of type 05 and length 00. The whole is a sequence of length 0D (13). The VarBind list is also a sequence of length 0F (15). The GetRequest PDU is of length 1D (29). Now we have three OCTET STRINGs related to security parameter, security model, and flags. Then we have two integers defining maximum size (1024) and message ID (64). The header is a sequence of length 12, which we left blank for simplicity. There is one integer, version (version 3). The whole message is a sequence of 52 bytes. Figure 21.23 shows the actual message sent by the manager station (client) to the agent (server). Example 5 See Next Slide
  • 46. 46 21.7 UDP PORTS SNMP uses the services of UDP on two well-known ports, 161 and 162. The well-known port 161 is used by the server (agent), and the well- known port 162 is used by the client (manager).
  • 47. 47 Figure 21.24 Port numbers for SNMP
  • 48. 48 21.8 SECURITY The main difference between SNMPv3 and SNMPv2 is the enhanced security. SNMPv3 provides two types of security: general and specific. SNMPv3 provides message authentication, privacy, and manager authorization.