SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Network Management

• Network management is the process of controlling
  a complex data network to maximize its efficiency
  and productivity
• The overall goal of network management is to help
  with the complexity of a data network and to
  ensure that data can go across it with maximum
  efficiency and transparency to the users
Network Management
                  Requirements

Example of approach
• Controlling strategic assets
• Controlling complexity
• Improving service
• Balancing various needs: performance, availability, security, cost
• Reducing downtime
• Controlling costs
Network Management

• The International Organization for Standardization
  (ISO) Network Management Forum divided
  network management into five functional areas:
   –   Fault Management
   –   Configuration Management
   –   Security Management
   –   Performance Management
   –   Accounting Management
Fault Management
• Is the process of locating problems, or faults, on the data
  network
• It involves the following steps:
   – Detect the fault
   – Determine exactly where the fault is
   – Isolate the rest of the network from the failure so that it can
     continue to function
   – Reconfigure or modify the network in such a way as to minimize
     the impact
   – Repair or replace the failed components

   – Tests: connectivity, data integrity, response-time, ….
Configuration Management
• The configuration of certain network devices controls the
  behavior of the data network
• Configuration management is the process of finding and
  setting up (configuring) these critical devices
• Involves following steps:
   –   Installation of new hardware/software
   –   Tracking changes in control configuration
   –   Who, what and why? - network topology
   –   Revert/undo changes
   –   Change management
   –   Configuration audit
   –   Does it do what was intended
Security Management
• Is the process of controlling access to information on the
  data network
• Provides a way to monitor access points and records
  information on a periodic basis
• Provides audit trails and sounds alarms for security
  breaches
• Several security measures are provided:
   – Security services: generating, distributing, storing of encryption
     keys for services
   – Exception alarm generation, detection of problems
   – Uniform access control to resources
   – Backups, data security
   – Security logging
Performance Management
• Involves measuring the performance of the network
  hardware, software, and media
• Examples of measured activities are:
   –   What is the level of capacity utilization?
   –   Is there excessive traffic?
   –   Has throughput been reduced to unacceptable levels?
   –   Are there bottlenecks?
   –   Is response time increasing?
   –   What is the error rates?
   –   Indicators: availability, response time, accuracy  service
                   throughput, utilization               efficiency
Accounting Management

• Involves tracking individual’s utilization and grouping of
  network resources to ensure that users have sufficient
  resources
• Involves granting or removing permission for access to the
  network
• Identifying consumers and suppliers of network resources -
  users and groups
• Mapping network resources consumption to customer
  identity
• Billing
Network Management Protocols
• A simple protocol defines common data formats and
  parameters and allows for easy retrieval of information
• A complex protocol adds some change capability and
  security
• An advanced protocol remotely executes network
  management tasks, is independent of the network
  protocol layer
• Managed objects: functions provided by the network
• Element Management Systems (EMS): managing a
  specific portion of the network (may manage async lines,
  multiplexers, routers)
• Managers of Manager Systems (MoM): integrate
  together information from several EMS
Network Management
                Standards

• Internet approach: Simple Network Management Protocol (SNMP,
  secure SNMP, SNMP v2)
• OSI approach: CMIP - common management information protocol,
  CMIS - common management information service (user interface)

We concentrate on SNMP
Network Management
                   Proprietary solutions

• The world of Microsoft PC software:
  Windows NT + several (or hundreds) of PCs with Windows 95 (98??)

• Solution: Microsoft SMS software:
   full control over workstations (Windows95) from central NT server
   software configuration, updates, full inventory

• NT world - incorporates SNMP mechanisms
Network Management Protocols

• So where is technology today?
   – The most common protocols are:
      • SNMP (Simple Network Management Protocol)
      • SNMPv2 (SNMP version 2)
      • CMIS/CMIP (Common Management Information
        Services/Common Management Information Protocol)
Network Management Protocols

• SNMP is beyond the simple protocol with adequate
  monitoring capabilities and some change
  capabilities
• SNMPv2 greatly enhances the SNMP feature set
• CMIS/CMIP approaches the advanced tool, but
  implementation issues have limited its use
SNMP
• At the end of the 80’s, a solution was chosen called
  the Internet-standard Network Management
  Framework.
• This was a set of three documents defining:
   – A set of rules for describing management information
   – An initial set of managed objects
   – A protocol used to exchange management information
• Comprised of agents and managers
   •Agent - process running on each managed node collecting
   information about the device it is running on.

   •Manager - process running on a management workstation that
   requests information about devices on the network.
SNMP

• The SNMP protocol was a mere 36 pages within
  these documents
• The framework could be extended by defining new
  managed objects, but changes to the description
  rules or the protocol weren’t allowed.
• Today, there are literally hundreds of SNMP-
  capable products and thousands of managed object
  definitions.
SNMP

• The work on SNMP security was completed in
  early 1992
• The security features introduced authentication,
  authorization, and privacy
• Unfortunately, this required a changed in the
  SNMP protocol which became SNMPv2
SNMP

• A group was formed and their efforts were
  complete in early 1993
• There are 12 documents describing SNMPv2
• There are 3 basic commands that are used with
  SNMP:
   – Get
   – Set
   – Get Next
SNMP

• Authorization and authentication relies on a SNMP
  community string
• The community string(s) can be read-only or read-
  write
• The default community strings are:
   – public (read-only)
   – private (read-write)
• Community strings are case sensitive
Advantages of using SNMP


•   Standardized
•   universally supported
•   extendible
•   portable
•   allows distributed management access
•   lightweight protocol
SNMP

• There are two approaches for the management
  system to obtain information from SNMP
  – Traps
  – Polling
Trap
•Traps are unrequested event reports that are sent to a
management system by an SNMP agent process
•When a trappable event occurs, a trap message is generated
by the agent and is sent to a trap destination (a specific,
configured network address)
•Many events can be configured to signal a trap, like a
network cable fault, failing NIC or Hard Drive, a “General
Protection Fault”, or a power supply failure
•Traps can also be throttled -- You can limit the number of
traps sent per second from the agent
•Traps have a priority associated with them -- Critical, Major,
Minor, Warning, Marginal, Informational, Normal, Unknown
Trap Receivers
•Traps are received by a management application.
•Management applications can handle the trap in a few ways:
  •Poll the agent that sent the trap for more information about the event, and
  the status of the rest of the machine.
  •Log the reception of the trap.
  •Completely ignore the trap.
•Management applications can be set up to send off an e-
mail, call a voice mail and leave a message, or send an alpha-
numeric page to the network administrator’s pager that says:
         Your PDC just Blue-Screened at 03:46AM. Have a nice day. :)
SNMP Traps

• When an event happens on a network device a trap
  is sent to the network management system
• A trap will contain:
   – Network device name
   – Time the event happened
   – Type of event
SNMP Traps

• Resources are required on the network device to
  generate a trap
• When a lot of events occur,the network bandwidth
  may be tied up with traps
    – Thresholds can be used to help
•     Because the network device has a limited view, it
    is possible the management system has already
    received the information and the trap is redundant
SNMP Polling

• The network management system periodically
  queries the network device for information
• The advantage is the network management system
  is in control and knows the “big picture”
• The disadvantage is the amount of delay from
  when an event occurs to when it’s noticed
  – Short interval, network bandwidth is wasted
  – Long interval, response to events is too slow
SNMP Traps/Polling

• When an event occurs, the network device
  generates a simple trap
• The management system then polls the network
  device to get the necessary information
• The management system also does low frequency
  polling as a backup to the trap
SNMP MIBS

• Management Information Base (MIB) is a
  collection of related managed objects
• Used to define what information you can get back
  from the network device
• There are standard and enterprise specific MIBS
SNMP MIBS

• Types of MIB Modules
  – Standard: These are the standard MIBS currently
    designed to capture the core aspects of the particular
    technology
  – Experimental: Temporary and if achieves
    standardization then it is placed in the standard module
  – Enterprise-specific: Vendor specific MIBS that provide
    additional management capabilities for those features
    that require it
SNMP MIB Tools

•   A MIB compiler
•   A MIB browser
•   A MIB alias tool
•   A MIB query tool
CIMS/CIMP

• The OSI framework is an object-oriented paradigm
   – Objects have attributes, generate events, and perform
     actions
   – Objects are scoped by numerous hierarchies for the
     purpose of inheritance or containment
• Although the OSI model “sounds neat”, it is much
  more complicated and is not very common
Network Management Protocols

• These protocols do not state how to accomplish the
  goals of network management
• They give methods to monitor and configure
  network devices
• The challenge to analyze the information in an
  effective manner rests with software engineers who
  write network management applications
Network Management Platform

• Historically, network management revolved around
  multiple systems, each managing one specific set
  of components on the data network
• Restrictions of money, physical space, and
  technical expertise led to the desire to have the
  components managed by a single system that
  would show their interconnections on a network
  map
Network Management Platform

• A network management platform is a software
  package that provides the basic functionality of
  network management for different network
  components
• The goal for the platform is to provide generic
  functionality for managing a variety of network
  devices
Network Management Platform

• Basic features for any platform to include are:
   –   Graphical User Interface (GUI)
   –   Network Map
   –   Database Management System (DBMS)
   –   Standard Method to Query Devices
   –   Customizable Menu System
   –   Event Log
Network Management Platform

• Additional features for a platform include:
   – Graphing Tools
   – Application Programming Interface (API)
   – System Security
Network Management Platform

• Management Platforms that exist today
   –   Sun’s SunNet Manager
   –   HP’s OpenView
   –   IBM’s Netview for AIX
   –   Cabletron’s Spectrum
Network Management
              Architectures
• The Network Management Platform can use
  various architectures to provide functionality
• The 3 most common are:
   – Centralized
   – Hierarchical
   – Distributed
Centralized Architecture

• The Network Management Platform resides on a
  single computer system
• For full redundancy, the computer system is
  backed up by another system
• Can allow access and forward events to other
  consoles on network
Centralized Architecture

• Used for:
   – All network alerts & events
   – All network information
   – Access all management applications
Centralized Architecture

• Pros:
  – Single location to view events & alerts
  – Single place to access network management applications
    and information
  – Security is easier to maintain
Centralized Architecture

• Cons:
  – Single system is not redundant or fault tolerant
  – As network elements are added, may be difficult or
    expensive to scale system to handle load
  – Having to query all devices from a single location
Hierarchical Architecture

• Uses multiple computer systems
   – One system acting as the central server
   – Other systems working as clients
• Central server requires backups for redundancy
Hierarchical Architecture

• Key features:
   –   Not dependent on a single system
   –   Distribution of network management tasks
   –   Network monitoring distributed throughout network
   –   Centralized information storage
Hierarchical Architecture

• Pros:
  – Multiple systems to manage the network
• Cons:
  – Information gathering is more difficult and time
    consuming
  – The list of managed devices managed by each client
    needs to be predetermined and manually configured
Distributed Architecture

• Combines the centralized and hierarchical
  architectures
• Uses multiple peer network management systems
  – Each peer can have a complete database
  – Each peer can perform various tasks and report back to a
    central system
Distributed Architecture

• Contains advantages from central & hierarchical
  architectures
   – Single location for all network information, alerts &
     events
   – Single location to access all management applications
   – Not dependent on a single system
   – Distribution of network management tasks
   – Distribution of network monitoring throughout the
     network
Network Management
              Applications
• Goals
   – Effectively manage a specific set of devices
   – Avoid functionality overlap with the platform
   – Integrate with a platform through the API and menu
     system
   – Reside on multiple platforms
• Applications do not share information
Network Management
             Applications
• Applications that exist today
   – BayNetworks’ Optivity
   – Cisco’s CiscoWorks
   – 3Com’s Transcend
Choosing a Network Management
                System
• Built from two major components: the Platform
  and Applications
• A practical approach follows these steps:
   –   Perform device inventory
   –   Prioritize the functional areas of network management
   –   Survey network management applications
   –   Choose the network management platform
Other Topics

• Sniffers
• RMON
• Network Statistics
Network Statistics

•   Baseline
•   Trouble shooting
•   Capacity planning for the future
•   Reports

Weitere ähnliche Inhalte

Was ist angesagt?

MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and FilteringAisha Talat
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsUMA MAHESWARI
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture NotesFellowBuddy.com
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 

Was ist angesagt? (20)

MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Secure Network Design
Secure Network DesignSecure Network Design
Secure Network Design
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Osi model
Osi modelOsi model
Osi model
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 

Andere mochten auch

Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementSorath Asnani
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
Common Protocol Template Executive Summary
Common Protocol Template Executive SummaryCommon Protocol Template Executive Summary
Common Protocol Template Executive SummaryTransCelerateBioPharma
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsSolarWinds
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the EssentialsLiving Online
 
Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Living Online
 
User interface design(sommerville) bangalore university
User interface design(sommerville) bangalore universityUser interface design(sommerville) bangalore university
User interface design(sommerville) bangalore universityJaisha Shankar
 
The Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing ContentThe Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing ContentNeil Patel
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemEddyzulham Mahluzydde
 
Fundamentals of Database system
Fundamentals of Database systemFundamentals of Database system
Fundamentals of Database systemphilipsinter
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theorymanagement 2
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 

Andere mochten auch (20)

Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network Management
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Common Protocol Template Executive Summary
Common Protocol Template Executive SummaryCommon Protocol Template Executive Summary
Common Protocol Template Executive Summary
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
KNIME tutorial
KNIME tutorialKNIME tutorial
KNIME tutorial
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the Essentials
 
Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
snmp
snmpsnmp
snmp
 
User interface design(sommerville) bangalore university
User interface design(sommerville) bangalore universityUser interface design(sommerville) bangalore university
User interface design(sommerville) bangalore university
 
User interface-design
User interface-designUser interface-design
User interface-design
 
The Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing ContentThe Ultimate Guide to Creating Visually Appealing Content
The Ultimate Guide to Creating Visually Appealing Content
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management System
 
Fundamentals of Database system
Fundamentals of Database systemFundamentals of Database system
Fundamentals of Database system
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theory
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 

Ähnlich wie Network management

(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocolGouasmia Zakaria
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdfEidTahir
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...jeronimored
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.ppt1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.pptFarid Er
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Managementjeronimored
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfMeresa Hiluf`
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)Olesya Shelestova
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmpPalanivel Kuppusamy
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentationGraeme Spice
 
5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptxAhmedAlRasheed18
 
infoAssurance (1).pptx
infoAssurance (1).pptxinfoAssurance (1).pptx
infoAssurance (1).pptxStevenJoeBiago
 
Tij3103 topic02 architectures
Tij3103 topic02 architecturesTij3103 topic02 architectures
Tij3103 topic02 architecturesnakomuri
 

Ähnlich wie Network management (20)

(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdf
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Chapter09
Chapter09Chapter09
Chapter09
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.ppt1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.ppt
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdf
 
Network management
Network managementNetwork management
Network management
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
SNMP
SNMPSNMP
SNMP
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentation
 
5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptx
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
infoAssurance (1).pptx
infoAssurance (1).pptxinfoAssurance (1).pptx
infoAssurance (1).pptx
 
Tij3103 topic02 architectures
Tij3103 topic02 architecturesTij3103 topic02 architectures
Tij3103 topic02 architectures
 

Mehr von Mohd Arif

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Project identification
Project identificationProject identification
Project identificationMohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniquesMohd Arif
 
Presentation
PresentationPresentation
PresentationMohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in cMohd Arif
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peerMohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systemsMohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdpMohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgetingMohd Arif
 
Networing basics
Networing basicsNetworing basics
Networing basicsMohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformMohd Arif
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardwareMohd Arif
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworkingMohd Arif
 

Mehr von Mohd Arif (20)

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Presentation
PresentationPresentation
Presentation
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Networing basics
Networing basicsNetworing basics
Networing basics
 
Loaders
LoadersLoaders
Loaders
 
Lists
ListsLists
Lists
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
Heap sort
Heap sortHeap sort
Heap sort
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworking
 
H.323
H.323H.323
H.323
 
Graphs
GraphsGraphs
Graphs
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Network management

  • 1. Network Management • Network management is the process of controlling a complex data network to maximize its efficiency and productivity • The overall goal of network management is to help with the complexity of a data network and to ensure that data can go across it with maximum efficiency and transparency to the users
  • 2. Network Management Requirements Example of approach • Controlling strategic assets • Controlling complexity • Improving service • Balancing various needs: performance, availability, security, cost • Reducing downtime • Controlling costs
  • 3. Network Management • The International Organization for Standardization (ISO) Network Management Forum divided network management into five functional areas: – Fault Management – Configuration Management – Security Management – Performance Management – Accounting Management
  • 4. Fault Management • Is the process of locating problems, or faults, on the data network • It involves the following steps: – Detect the fault – Determine exactly where the fault is – Isolate the rest of the network from the failure so that it can continue to function – Reconfigure or modify the network in such a way as to minimize the impact – Repair or replace the failed components – Tests: connectivity, data integrity, response-time, ….
  • 5. Configuration Management • The configuration of certain network devices controls the behavior of the data network • Configuration management is the process of finding and setting up (configuring) these critical devices • Involves following steps: – Installation of new hardware/software – Tracking changes in control configuration – Who, what and why? - network topology – Revert/undo changes – Change management – Configuration audit – Does it do what was intended
  • 6. Security Management • Is the process of controlling access to information on the data network • Provides a way to monitor access points and records information on a periodic basis • Provides audit trails and sounds alarms for security breaches • Several security measures are provided: – Security services: generating, distributing, storing of encryption keys for services – Exception alarm generation, detection of problems – Uniform access control to resources – Backups, data security – Security logging
  • 7. Performance Management • Involves measuring the performance of the network hardware, software, and media • Examples of measured activities are: – What is the level of capacity utilization? – Is there excessive traffic? – Has throughput been reduced to unacceptable levels? – Are there bottlenecks? – Is response time increasing? – What is the error rates? – Indicators: availability, response time, accuracy service throughput, utilization efficiency
  • 8. Accounting Management • Involves tracking individual’s utilization and grouping of network resources to ensure that users have sufficient resources • Involves granting or removing permission for access to the network • Identifying consumers and suppliers of network resources - users and groups • Mapping network resources consumption to customer identity • Billing
  • 9. Network Management Protocols • A simple protocol defines common data formats and parameters and allows for easy retrieval of information • A complex protocol adds some change capability and security • An advanced protocol remotely executes network management tasks, is independent of the network protocol layer • Managed objects: functions provided by the network • Element Management Systems (EMS): managing a specific portion of the network (may manage async lines, multiplexers, routers) • Managers of Manager Systems (MoM): integrate together information from several EMS
  • 10. Network Management Standards • Internet approach: Simple Network Management Protocol (SNMP, secure SNMP, SNMP v2) • OSI approach: CMIP - common management information protocol, CMIS - common management information service (user interface) We concentrate on SNMP
  • 11. Network Management Proprietary solutions • The world of Microsoft PC software: Windows NT + several (or hundreds) of PCs with Windows 95 (98??) • Solution: Microsoft SMS software: full control over workstations (Windows95) from central NT server software configuration, updates, full inventory • NT world - incorporates SNMP mechanisms
  • 12. Network Management Protocols • So where is technology today? – The most common protocols are: • SNMP (Simple Network Management Protocol) • SNMPv2 (SNMP version 2) • CMIS/CMIP (Common Management Information Services/Common Management Information Protocol)
  • 13. Network Management Protocols • SNMP is beyond the simple protocol with adequate monitoring capabilities and some change capabilities • SNMPv2 greatly enhances the SNMP feature set • CMIS/CMIP approaches the advanced tool, but implementation issues have limited its use
  • 14. SNMP • At the end of the 80’s, a solution was chosen called the Internet-standard Network Management Framework. • This was a set of three documents defining: – A set of rules for describing management information – An initial set of managed objects – A protocol used to exchange management information • Comprised of agents and managers •Agent - process running on each managed node collecting information about the device it is running on. •Manager - process running on a management workstation that requests information about devices on the network.
  • 15. SNMP • The SNMP protocol was a mere 36 pages within these documents • The framework could be extended by defining new managed objects, but changes to the description rules or the protocol weren’t allowed. • Today, there are literally hundreds of SNMP- capable products and thousands of managed object definitions.
  • 16. SNMP • The work on SNMP security was completed in early 1992 • The security features introduced authentication, authorization, and privacy • Unfortunately, this required a changed in the SNMP protocol which became SNMPv2
  • 17. SNMP • A group was formed and their efforts were complete in early 1993 • There are 12 documents describing SNMPv2 • There are 3 basic commands that are used with SNMP: – Get – Set – Get Next
  • 18. SNMP • Authorization and authentication relies on a SNMP community string • The community string(s) can be read-only or read- write • The default community strings are: – public (read-only) – private (read-write) • Community strings are case sensitive
  • 19. Advantages of using SNMP • Standardized • universally supported • extendible • portable • allows distributed management access • lightweight protocol
  • 20. SNMP • There are two approaches for the management system to obtain information from SNMP – Traps – Polling
  • 21. Trap •Traps are unrequested event reports that are sent to a management system by an SNMP agent process •When a trappable event occurs, a trap message is generated by the agent and is sent to a trap destination (a specific, configured network address) •Many events can be configured to signal a trap, like a network cable fault, failing NIC or Hard Drive, a “General Protection Fault”, or a power supply failure •Traps can also be throttled -- You can limit the number of traps sent per second from the agent •Traps have a priority associated with them -- Critical, Major, Minor, Warning, Marginal, Informational, Normal, Unknown
  • 22. Trap Receivers •Traps are received by a management application. •Management applications can handle the trap in a few ways: •Poll the agent that sent the trap for more information about the event, and the status of the rest of the machine. •Log the reception of the trap. •Completely ignore the trap. •Management applications can be set up to send off an e- mail, call a voice mail and leave a message, or send an alpha- numeric page to the network administrator’s pager that says: Your PDC just Blue-Screened at 03:46AM. Have a nice day. :)
  • 23. SNMP Traps • When an event happens on a network device a trap is sent to the network management system • A trap will contain: – Network device name – Time the event happened – Type of event
  • 24. SNMP Traps • Resources are required on the network device to generate a trap • When a lot of events occur,the network bandwidth may be tied up with traps – Thresholds can be used to help • Because the network device has a limited view, it is possible the management system has already received the information and the trap is redundant
  • 25. SNMP Polling • The network management system periodically queries the network device for information • The advantage is the network management system is in control and knows the “big picture” • The disadvantage is the amount of delay from when an event occurs to when it’s noticed – Short interval, network bandwidth is wasted – Long interval, response to events is too slow
  • 26. SNMP Traps/Polling • When an event occurs, the network device generates a simple trap • The management system then polls the network device to get the necessary information • The management system also does low frequency polling as a backup to the trap
  • 27. SNMP MIBS • Management Information Base (MIB) is a collection of related managed objects • Used to define what information you can get back from the network device • There are standard and enterprise specific MIBS
  • 28. SNMP MIBS • Types of MIB Modules – Standard: These are the standard MIBS currently designed to capture the core aspects of the particular technology – Experimental: Temporary and if achieves standardization then it is placed in the standard module – Enterprise-specific: Vendor specific MIBS that provide additional management capabilities for those features that require it
  • 29. SNMP MIB Tools • A MIB compiler • A MIB browser • A MIB alias tool • A MIB query tool
  • 30. CIMS/CIMP • The OSI framework is an object-oriented paradigm – Objects have attributes, generate events, and perform actions – Objects are scoped by numerous hierarchies for the purpose of inheritance or containment • Although the OSI model “sounds neat”, it is much more complicated and is not very common
  • 31. Network Management Protocols • These protocols do not state how to accomplish the goals of network management • They give methods to monitor and configure network devices • The challenge to analyze the information in an effective manner rests with software engineers who write network management applications
  • 32. Network Management Platform • Historically, network management revolved around multiple systems, each managing one specific set of components on the data network • Restrictions of money, physical space, and technical expertise led to the desire to have the components managed by a single system that would show their interconnections on a network map
  • 33. Network Management Platform • A network management platform is a software package that provides the basic functionality of network management for different network components • The goal for the platform is to provide generic functionality for managing a variety of network devices
  • 34. Network Management Platform • Basic features for any platform to include are: – Graphical User Interface (GUI) – Network Map – Database Management System (DBMS) – Standard Method to Query Devices – Customizable Menu System – Event Log
  • 35. Network Management Platform • Additional features for a platform include: – Graphing Tools – Application Programming Interface (API) – System Security
  • 36. Network Management Platform • Management Platforms that exist today – Sun’s SunNet Manager – HP’s OpenView – IBM’s Netview for AIX – Cabletron’s Spectrum
  • 37. Network Management Architectures • The Network Management Platform can use various architectures to provide functionality • The 3 most common are: – Centralized – Hierarchical – Distributed
  • 38. Centralized Architecture • The Network Management Platform resides on a single computer system • For full redundancy, the computer system is backed up by another system • Can allow access and forward events to other consoles on network
  • 39. Centralized Architecture • Used for: – All network alerts & events – All network information – Access all management applications
  • 40. Centralized Architecture • Pros: – Single location to view events & alerts – Single place to access network management applications and information – Security is easier to maintain
  • 41. Centralized Architecture • Cons: – Single system is not redundant or fault tolerant – As network elements are added, may be difficult or expensive to scale system to handle load – Having to query all devices from a single location
  • 42. Hierarchical Architecture • Uses multiple computer systems – One system acting as the central server – Other systems working as clients • Central server requires backups for redundancy
  • 43. Hierarchical Architecture • Key features: – Not dependent on a single system – Distribution of network management tasks – Network monitoring distributed throughout network – Centralized information storage
  • 44. Hierarchical Architecture • Pros: – Multiple systems to manage the network • Cons: – Information gathering is more difficult and time consuming – The list of managed devices managed by each client needs to be predetermined and manually configured
  • 45. Distributed Architecture • Combines the centralized and hierarchical architectures • Uses multiple peer network management systems – Each peer can have a complete database – Each peer can perform various tasks and report back to a central system
  • 46. Distributed Architecture • Contains advantages from central & hierarchical architectures – Single location for all network information, alerts & events – Single location to access all management applications – Not dependent on a single system – Distribution of network management tasks – Distribution of network monitoring throughout the network
  • 47. Network Management Applications • Goals – Effectively manage a specific set of devices – Avoid functionality overlap with the platform – Integrate with a platform through the API and menu system – Reside on multiple platforms • Applications do not share information
  • 48. Network Management Applications • Applications that exist today – BayNetworks’ Optivity – Cisco’s CiscoWorks – 3Com’s Transcend
  • 49. Choosing a Network Management System • Built from two major components: the Platform and Applications • A practical approach follows these steps: – Perform device inventory – Prioritize the functional areas of network management – Survey network management applications – Choose the network management platform
  • 50. Other Topics • Sniffers • RMON • Network Statistics
  • 51. Network Statistics • Baseline • Trouble shooting • Capacity planning for the future • Reports