SlideShare ist ein Scribd-Unternehmen logo
1 von 40
In the name of ALLAH, the
most merciful and
beneficent.

1
Group Members
 Muhammad Imran Shareef ( GL )
 Muhammad Hassan Rasheed
 Hafiz Ali Raza
 Abdul Munam
 Awais Ghaffar
 Muhammad Kamil

2
SNMP
Simple Network Management Protocol

3
Simple Network Management Protocol
¤ SNMP is "Internet-standard protocol for managing devices on IP
networks”.

¤ Devices that support SNMP include routers, switches, Servers,
workstations, printers, modem racks, and more.
¤ SNMP is used to monitor network-attached devices.

¤ SNMP is a component of the Internet Protocol Suite as defined by
the Internet Engineering Task Force (IETF).
4
SNMP concept

5
SNMP & Network Management History
 1983 - TCP/IP replaces ARPANET at U.S. Dept. Of Defense,
effective Birth of internet.
 First model for net management – HEMS – High Level Entity
Management system ( RFCs 1021,1022,1024,1076)
 1987 – CMIP - Common Management information protocol , and
CMOT ( CMIP over TCP) for the actual network protocol for use on
the internet.
 Nov 1987- SGMP – Simple Gateway Monitoring protocol ( RFC 1028)
 Aug 1989 – Internet Standard Network Management Frame work (
RFCs 1065, 1066, 1067)

6
SNMP & Network Management History
 Apr 1989 – SNMP promoted to recommended status as the de fecto
TCP/IP network management frame work ( RFC 1098 )
 June 1989 – IAB committee decides to let SNMP and CMOT develop
separately
 May 1990 – IAB promotes SNMP to a standard protocol with a
recommended status ( RFC 1157 )
 Mar 1991 – Format of MIBs and traps defined ( RFCs 1212, 1215)
 TCP/IP MIB definition revised to create SNMP V1 ( RFC 1213 )

7
Components of network management on the Internet

8
SNMP Framework

Protocol: “Manager-Agent” interaction
BER: Basic Encoding Rules

MIB: Management Information Base
(Database on managed devices)



SMI: Structure of Management Information
(Rules of describing management information

9
SMI : Structure of Management
Information
 SMI defines the general rules for naming objects, defining object
types and showing how to encode objects and values.
 SMI does not define the number of objects an entity should manage
or name the objects to be managed
 define the association between the objects and their values.

10
SMI Data Types (Examples)
•
•
•
•
•
•
•
•
•

INTEGER -- signed 32-bit integer
OCTET STRING
OBJECT IDENTIFIER (OID)
NULL -- not actually data type, but data value
IpAddress -- OCTET STRING of size 4, in network byte order (B.E.)
Counter -- unsigned 32-bit integer (rolls over)
Gauge -- unsigned 32-bit integer (will top out and stay there)
TimeTicks -- unsigned 32-bit integer (rolls over after 497 days)
Opaque -- used to create new data types not in SNMPv1

• DateAndTime, DisplayString, MacAddress, PhysAddress, TimeInterval, TimeStamp, TruthValue,
VariablePointer -- textual conventions used as types
11
MIB : Management Information Base
 MIB creates a collection of named objects, their types, and their
relationships to each other in an entity to be managed.
 MIB is the definition of “objects” that should be provided on each
managed node by the SNMP “agent”.
 An “object” is a quantity or a field that describes one functional
aspect of a device.
 MIB objects are arranged in “groups”
 Some groups relate to “layer” of the protocol stack.
 Other groups relate to the system as a “whole”
12
MIB

13
BER – Basic Encoding Rules
 The relationship between ASN.1 and BER
 parallels that of source code and machine code.
 CCITT X.209 specifies the Basic Encoding Rules
 All SNMP messages are converted / serialized from ASN.1 notation
into smaller, binary data (BER)

14
Features of SNMP
¤ Its design is simple , making it easier to implement on network of
any size.
¤ Its simple design makes it easy for a user to program variables
they would like to have monitored.
¤ It is popular and extensible.
 A device manufacturer can easily add new registers for
monitoring

15
Key Components of SNMP
¤ An SNMP-managed network consists of three key
components.
 Managed device
 Agent — software which runs on managed devices
 Network management system (NMS) — software which
runs on the manager

16
Managed Device
¤ A managed device is a network node that implements an
SNMP interface.
¤ It allows unidirectional (read-only) or bidirectional access
to node-specific information.
¤ Managed devices exchange node-specific information
with the NMSs.
¤ The managed devices can be routers, servers, switches,
bridges, hubs, IP telephones, IP video cameras ,printers
etc.
17
SNMP Agent
¤ An agent is a network-management software module that resides on
a managed device.
¤ An agent has local knowledge of management information.

18
SNMP Components

19
Network Management System
 A network management system (NMS) executes applications that
monitor and control managed devices.
 NMSs provide the bulk of the processing And memory resources
required for network management.
 One or more NMSs may exist on any managed network

20
NETWORK MANAGEMENT SYSTEM
 We can say that the functions performed by a network
management system can be divided into five broad
categories:
 Configuration management
 Fault management
 Performance management
 Security management
 Accounting management

21
Functions of a network management system

22
Basic Task of NMS
 Configuration management
 Keeping track of device settings and how they function

 Fault management
 Dealing with problems and emergencies in networks
( Router stops routing , Server loses power etc)

 Performance Management
 How smoothly is the network running?
 Can it handle the work load it currently has?
23
24
Proxy Agents
¤ Proxy Agents extend the capabilities of SNMP by allowing it:







Manage a device that cannot support an SNMP agent
Manage a device that supports a non-SNMP management agent
Allow a non-SNMP management system to access an SNMP agent
Provide firewall-type security to other SNMP agents
Translate between different formats of SNMP messages
Consolidate multiple managed nodes into a single network address

25
SNMP Messages
 Get-Request
 Sent by manager requesting specific data from agent

 Get-Next-Request
 Sent by manager requesting data on the next MO to the one specified

 Set-Request
 Initializes or changes the value of network element

 Get-Response
 Agent responds with data for get and set requests from the manager

 Trap
 Alarm generated by an agent

26
27
SNMP Operation
 SNMP operates in the Application Layer of the OSI model.
 The SNMP agent receives requests on UDP port 161.
 The manager may send requests from any available source port to port
161 in the agent.
 The agent response will be sent back to the source port on the manager.
 The manager receives Traps and InformRequests on port 162.
 The agent may generate notifications from any available port.
 When used with Transport Layer Security or Datagram Transport Layer
Security requests are received on port 10161 and traps are sent to port
10162.[3]
28
SNMP Versions
¤ Two major versions SNMPV1, SNMPV2
¤SNMPV1 is the recommended standard
¤SNMPV2 has become split into:
 SNMPV2U – SNMP with user based security
 SNMPV2* - SNMP with user based security and additional features
 SNMPV2C – SNMPV2 Without security

29
SNMP Versions
 SNMPv1 specifies five core protocol data units (PDUs). Two other
PDUs, GetBulkRequest and InformRequest were added in SNMPv2 and
carried over to SNMPv3.
 All SNMP PDUs are constructed as follows:

Ip
Header

UDP
Header

Version

Community

PDUType

Request id

Error
Status

Error Index

Variable
bindings

30
SNMP V1
 Version 1 :
 SNMP version 1 is the initial implementation of the SNMP protocol.
 SNMPv1 operates over protocols such as User Datagram Protocol (UDP), Internet
Protocol
 SNMPv1 is widely used and is the de facto network-management protocol in the Internet
community
 The first RFCs for SNMP, now known as SNMPv1, appeared in 1988:
 Version 1 has been criticized for its poor security.
 Authentication of clients is performed only by a "community string", in effect a type of
password, which is transmitted in clear text.
 '80s design of SNMP V1 was done by a group of collaborators who viewed the officially
sponsored OSI/IETF/NSF (National Science Foundation) effort (HEMS/CMIS/CMIP) as
both implementable in the computing platforms of the time as well as potentially
unworkable.
31
SNMP V2
 SNMPv2 (RFC 1441–RFC 1452), revises version 1
 Improvements in the areas of performance, security, confidentiality,
and manager-to-manager communications.
 It introduced Get Bulk Request, an alternative of Get Nex Requests for
retrieving large amounts of management data in a single request.
 The new party-based security system in SNMPv2, viewed by many as
overly complex, was not widely accepted.

32
SNMP V3
 Version 3 :
 Although SNMPv3 makes no changes to the protocol aside from the addition of cryptographic
security
 it looks much different due to new textual conventions, concepts, and terminology.
 SNMPv3 primarily added security and remote configuration enhancements to SNMP.
 Security has been the biggest weakness of SNMP since the beginning.
 Authentication in SNMP Versions 1 and 2 amounts to nothing more than a password (community
string) sent in clear text between a manager and agent.
 Each SNMPv3 message contains security parameters which are encoded as an octet string.
 The meaning of these security parameters depends on the security model being used.
 In practice, SNMP implementations often support multiple versions: typically SNMPv1, SNMPv2c,
and SNMPv3.

33
Advantages of using SNMP
¤ Standardized
¤ Universally supported
¤ Extendible
¤ Portable
¤ Allows distributed management access
¤ Light weighted protocol

34
Disadvantages of SNMP
 Reducing network bandwidth
 some large security gaps
 largest security problems
 privacy of data
 authentication
 access control

 so simple that the information it deals with is neither detailed nor
well-organized enough to deal with the expanding networks

35
SNMP Architecture and model
Network management

Organization Model

Information Model

Communication Model

Functional Model

36
SNMP & The OSI Model
7 Application Layer Management and Agent APIs
SNMP
6 Presentation Layer
ASN.1 and BER
5
Session Layer
RPC and NetBIOS
4 Transport Layer
TCP and UDP
3
Network Layer
IP and IPX
2 Data Link Layer
Ethernet, Token Ring, FDDI
1
Physical Layer

37
Ports & UDP
¤ SNMP uses User Datagram protocol (UDP) as the transport
mechanism for SNMP message

Ethernet
Frame

IP packet

UDP datagram

SNMP Message

¤ Like FTP, SNMP uses two well-known ports to operate
 UDP Port 161 – SNMP Message
 UDP Port 162– SNMP Trap Message
38
Languages of SNMP
¤ Structure of Management Information ( SMI)
Specifies the format used for defining managed objects that are accessed via the SNMP
protocol

¤ Abstract Syntax Notation ( ASN .1)
Used to define the format of SNMP message and managed objects( MIB modules

¤ Basic Encoding Rules ( BER )
Used to encode the SNMP message into format suitable for transmission across a network

39
THANK YOU
40

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Snmp
SnmpSnmp
Snmp
 
SNMP
SNMPSNMP
SNMP
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Protocol snmp
Protocol snmpProtocol snmp
Protocol snmp
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
SNMP
SNMPSNMP
SNMP
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Transport layer
Transport layer Transport layer
Transport layer
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
SNMP
SNMPSNMP
SNMP
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Domain name system
Domain name systemDomain name system
Domain name system
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 

Andere mochten auch

Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Living Online
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the EssentialsLiving Online
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 
Network management
Network managementNetwork management
Network managementMohd Arif
 

Andere mochten auch (8)

Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the Essentials
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Network management
Network managementNetwork management
Network management
 
Smtp
SmtpSmtp
Smtp
 

Ähnlich wie snmp

Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocolni35540
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Managementjeronimored
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptxLilyMkayula
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdffashiionbeutycare
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocolGouasmia Zakaria
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptuseonlyfortech140
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokAhmed Gad
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
Project report
Project reportProject report
Project reportayush13bbm
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibilityHamdamboy (함담보이)
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 

Ähnlich wie snmp (20)

Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptx
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the Netwok
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Project report
Project reportProject report
Project report
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
Net Man
Net ManNet Man
Net Man
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 

Kürzlich hochgeladen

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Kürzlich hochgeladen (20)

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

snmp

  • 1. In the name of ALLAH, the most merciful and beneficent. 1
  • 2. Group Members  Muhammad Imran Shareef ( GL )  Muhammad Hassan Rasheed  Hafiz Ali Raza  Abdul Munam  Awais Ghaffar  Muhammad Kamil 2
  • 4. Simple Network Management Protocol ¤ SNMP is "Internet-standard protocol for managing devices on IP networks”. ¤ Devices that support SNMP include routers, switches, Servers, workstations, printers, modem racks, and more. ¤ SNMP is used to monitor network-attached devices. ¤ SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). 4
  • 6. SNMP & Network Management History  1983 - TCP/IP replaces ARPANET at U.S. Dept. Of Defense, effective Birth of internet.  First model for net management – HEMS – High Level Entity Management system ( RFCs 1021,1022,1024,1076)  1987 – CMIP - Common Management information protocol , and CMOT ( CMIP over TCP) for the actual network protocol for use on the internet.  Nov 1987- SGMP – Simple Gateway Monitoring protocol ( RFC 1028)  Aug 1989 – Internet Standard Network Management Frame work ( RFCs 1065, 1066, 1067) 6
  • 7. SNMP & Network Management History  Apr 1989 – SNMP promoted to recommended status as the de fecto TCP/IP network management frame work ( RFC 1098 )  June 1989 – IAB committee decides to let SNMP and CMOT develop separately  May 1990 – IAB promotes SNMP to a standard protocol with a recommended status ( RFC 1157 )  Mar 1991 – Format of MIBs and traps defined ( RFCs 1212, 1215)  TCP/IP MIB definition revised to create SNMP V1 ( RFC 1213 ) 7
  • 8. Components of network management on the Internet 8
  • 9. SNMP Framework Protocol: “Manager-Agent” interaction BER: Basic Encoding Rules MIB: Management Information Base (Database on managed devices)   SMI: Structure of Management Information (Rules of describing management information 9
  • 10. SMI : Structure of Management Information  SMI defines the general rules for naming objects, defining object types and showing how to encode objects and values.  SMI does not define the number of objects an entity should manage or name the objects to be managed  define the association between the objects and their values. 10
  • 11. SMI Data Types (Examples) • • • • • • • • • INTEGER -- signed 32-bit integer OCTET STRING OBJECT IDENTIFIER (OID) NULL -- not actually data type, but data value IpAddress -- OCTET STRING of size 4, in network byte order (B.E.) Counter -- unsigned 32-bit integer (rolls over) Gauge -- unsigned 32-bit integer (will top out and stay there) TimeTicks -- unsigned 32-bit integer (rolls over after 497 days) Opaque -- used to create new data types not in SNMPv1 • DateAndTime, DisplayString, MacAddress, PhysAddress, TimeInterval, TimeStamp, TruthValue, VariablePointer -- textual conventions used as types 11
  • 12. MIB : Management Information Base  MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed.  MIB is the definition of “objects” that should be provided on each managed node by the SNMP “agent”.  An “object” is a quantity or a field that describes one functional aspect of a device.  MIB objects are arranged in “groups”  Some groups relate to “layer” of the protocol stack.  Other groups relate to the system as a “whole” 12
  • 14. BER – Basic Encoding Rules  The relationship between ASN.1 and BER  parallels that of source code and machine code.  CCITT X.209 specifies the Basic Encoding Rules  All SNMP messages are converted / serialized from ASN.1 notation into smaller, binary data (BER) 14
  • 15. Features of SNMP ¤ Its design is simple , making it easier to implement on network of any size. ¤ Its simple design makes it easy for a user to program variables they would like to have monitored. ¤ It is popular and extensible.  A device manufacturer can easily add new registers for monitoring 15
  • 16. Key Components of SNMP ¤ An SNMP-managed network consists of three key components.  Managed device  Agent — software which runs on managed devices  Network management system (NMS) — software which runs on the manager 16
  • 17. Managed Device ¤ A managed device is a network node that implements an SNMP interface. ¤ It allows unidirectional (read-only) or bidirectional access to node-specific information. ¤ Managed devices exchange node-specific information with the NMSs. ¤ The managed devices can be routers, servers, switches, bridges, hubs, IP telephones, IP video cameras ,printers etc. 17
  • 18. SNMP Agent ¤ An agent is a network-management software module that resides on a managed device. ¤ An agent has local knowledge of management information. 18
  • 20. Network Management System  A network management system (NMS) executes applications that monitor and control managed devices.  NMSs provide the bulk of the processing And memory resources required for network management.  One or more NMSs may exist on any managed network 20
  • 21. NETWORK MANAGEMENT SYSTEM  We can say that the functions performed by a network management system can be divided into five broad categories:  Configuration management  Fault management  Performance management  Security management  Accounting management 21
  • 22. Functions of a network management system 22
  • 23. Basic Task of NMS  Configuration management  Keeping track of device settings and how they function  Fault management  Dealing with problems and emergencies in networks ( Router stops routing , Server loses power etc)  Performance Management  How smoothly is the network running?  Can it handle the work load it currently has? 23
  • 24. 24
  • 25. Proxy Agents ¤ Proxy Agents extend the capabilities of SNMP by allowing it:       Manage a device that cannot support an SNMP agent Manage a device that supports a non-SNMP management agent Allow a non-SNMP management system to access an SNMP agent Provide firewall-type security to other SNMP agents Translate between different formats of SNMP messages Consolidate multiple managed nodes into a single network address 25
  • 26. SNMP Messages  Get-Request  Sent by manager requesting specific data from agent  Get-Next-Request  Sent by manager requesting data on the next MO to the one specified  Set-Request  Initializes or changes the value of network element  Get-Response  Agent responds with data for get and set requests from the manager  Trap  Alarm generated by an agent 26
  • 27. 27
  • 28. SNMP Operation  SNMP operates in the Application Layer of the OSI model.  The SNMP agent receives requests on UDP port 161.  The manager may send requests from any available source port to port 161 in the agent.  The agent response will be sent back to the source port on the manager.  The manager receives Traps and InformRequests on port 162.  The agent may generate notifications from any available port.  When used with Transport Layer Security or Datagram Transport Layer Security requests are received on port 10161 and traps are sent to port 10162.[3] 28
  • 29. SNMP Versions ¤ Two major versions SNMPV1, SNMPV2 ¤SNMPV1 is the recommended standard ¤SNMPV2 has become split into:  SNMPV2U – SNMP with user based security  SNMPV2* - SNMP with user based security and additional features  SNMPV2C – SNMPV2 Without security 29
  • 30. SNMP Versions  SNMPv1 specifies five core protocol data units (PDUs). Two other PDUs, GetBulkRequest and InformRequest were added in SNMPv2 and carried over to SNMPv3.  All SNMP PDUs are constructed as follows: Ip Header UDP Header Version Community PDUType Request id Error Status Error Index Variable bindings 30
  • 31. SNMP V1  Version 1 :  SNMP version 1 is the initial implementation of the SNMP protocol.  SNMPv1 operates over protocols such as User Datagram Protocol (UDP), Internet Protocol  SNMPv1 is widely used and is the de facto network-management protocol in the Internet community  The first RFCs for SNMP, now known as SNMPv1, appeared in 1988:  Version 1 has been criticized for its poor security.  Authentication of clients is performed only by a "community string", in effect a type of password, which is transmitted in clear text.  '80s design of SNMP V1 was done by a group of collaborators who viewed the officially sponsored OSI/IETF/NSF (National Science Foundation) effort (HEMS/CMIS/CMIP) as both implementable in the computing platforms of the time as well as potentially unworkable. 31
  • 32. SNMP V2  SNMPv2 (RFC 1441–RFC 1452), revises version 1  Improvements in the areas of performance, security, confidentiality, and manager-to-manager communications.  It introduced Get Bulk Request, an alternative of Get Nex Requests for retrieving large amounts of management data in a single request.  The new party-based security system in SNMPv2, viewed by many as overly complex, was not widely accepted. 32
  • 33. SNMP V3  Version 3 :  Although SNMPv3 makes no changes to the protocol aside from the addition of cryptographic security  it looks much different due to new textual conventions, concepts, and terminology.  SNMPv3 primarily added security and remote configuration enhancements to SNMP.  Security has been the biggest weakness of SNMP since the beginning.  Authentication in SNMP Versions 1 and 2 amounts to nothing more than a password (community string) sent in clear text between a manager and agent.  Each SNMPv3 message contains security parameters which are encoded as an octet string.  The meaning of these security parameters depends on the security model being used.  In practice, SNMP implementations often support multiple versions: typically SNMPv1, SNMPv2c, and SNMPv3. 33
  • 34. Advantages of using SNMP ¤ Standardized ¤ Universally supported ¤ Extendible ¤ Portable ¤ Allows distributed management access ¤ Light weighted protocol 34
  • 35. Disadvantages of SNMP  Reducing network bandwidth  some large security gaps  largest security problems  privacy of data  authentication  access control  so simple that the information it deals with is neither detailed nor well-organized enough to deal with the expanding networks 35
  • 36. SNMP Architecture and model Network management Organization Model Information Model Communication Model Functional Model 36
  • 37. SNMP & The OSI Model 7 Application Layer Management and Agent APIs SNMP 6 Presentation Layer ASN.1 and BER 5 Session Layer RPC and NetBIOS 4 Transport Layer TCP and UDP 3 Network Layer IP and IPX 2 Data Link Layer Ethernet, Token Ring, FDDI 1 Physical Layer 37
  • 38. Ports & UDP ¤ SNMP uses User Datagram protocol (UDP) as the transport mechanism for SNMP message Ethernet Frame IP packet UDP datagram SNMP Message ¤ Like FTP, SNMP uses two well-known ports to operate  UDP Port 161 – SNMP Message  UDP Port 162– SNMP Trap Message 38
  • 39. Languages of SNMP ¤ Structure of Management Information ( SMI) Specifies the format used for defining managed objects that are accessed via the SNMP protocol ¤ Abstract Syntax Notation ( ASN .1) Used to define the format of SNMP message and managed objects( MIB modules ¤ Basic Encoding Rules ( BER ) Used to encode the SNMP message into format suitable for transmission across a network 39

Hinweis der Redaktion

  1. GatewayA device that connects two or more networks with different types of protocolsIntelligent deviceConvert data according to the protocol