SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Introduction To
Network Management Protocols
SNMP & TR-069
William.L
wiliwe@gmail.com
2006-01-09
Index
1 SUMMARY ................................................................................................................................1
1.1 GENERAL DESCRIPTION ........................................................................................................1
2 WHAT IS NETWORK MANAGEMENT...............................................................................2
2.1 CONFIGURATION MANAGEMENT...........................................................................................2
2.2 PERFORMANCE MANAGEMENT .............................................................................................2
2.3 ACCOUNTING MANAGEMENT................................................................................................2
2.4 FAULT MANAGEMENT ...........................................................................................................3
2.5 SECURITY MANAGEMENT .....................................................................................................3
2.6 THE ARCHITECTURE OF NETWORK MANAGEMENT ...............................................................3
3 SIMPLE NETWORK MANAGEMENT PROTOCOL.........................................................6
4 CPE WAN MANAGEMENT PROTOCOL (TR-069)............................................................7
4.1 AUTO-CONFIGURATION AND DYNAMIC SERVICE PROVISIONING...........................................7
4.2 SOFTWARE/FIRMWARE IMAGE MANAGEMENT ......................................................................7
4.3 STATUS AND PERFORMANCE MONITORING............................................................................7
4.4 DIAGNOSTICS........................................................................................................................7
4.5 PROTOCOL COMPONENTS......................................................................................................8
5 TERMINOLOGY .................................................................................................................... 11
5.1 B-NT : BROADBAND NETWORK TERMINATION ...................................................................11
5.2 CPE : CUSTOMER PREMISE EQUIPMENT..............................................................................11
5.3 ACS : AUTO-CONFIGURATION SERVER ...............................................................................11
5.4 DSLAM : DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER ............................................11
5.5 BRAS : BROADBAND REMOTE ACCESS SERVER .................................................................11
5.6 PARAMETER ........................................................................................................................11
5.7 IETF : INTERNET ENGINEERING TASK FORCE .....................................................................11
5.8 RPC : REMOTE PROCEDURE CALL ......................................................................................11
5.9 SOAP : SIMPLE OBJECT ACCESS PROTOCOL .......................................................................11
5.10 BER : BASIC ENCODING RULE............................................................................................12
6 REFERENCE...........................................................................................................................13
APPENDIX A. COMPARISON BETWEEN SNMP&CWMP....................................................14
APPENDIX B. EXPLANATION OF SOAP MESSAGE..............................................................15
APPENDIX C. INFORM MESSAGE ETHEREAL PCAP .........................................................17
1
1 Summary
1.1 General Description
Network management function is one of the most important functions, because it let the manager could
monitor the remote device in the distance. Simple Network Management Protocol [9], SNMP, is one of popular
network management methods. SNMP is referred to as "simple" because the agent requires minimal software.
After the SNMP, the new generation network management protocol, CPE WAN Management Protocol, was
developed. Many telecom and service providers are making TR-069 support a requirement for all new CPE
purchases and proposals, so we will introduce this new management protocol.
2
2 What is Network Management
In general, network management is a service that employs a variety of tools, applications, and devices to assist
human network managers in monitoring and maintaining networks. The network management has five main
functions:
2.1 Configuration Management
To monitor network and system configuration information so that the effects on network operation of various
versions of hardware and software elements can be tracked and managed.
Each network device has a variety of version information associated with it.
Configuration management subsystems store this information in a database for easy access. When a problem
occurs, this database can be searched for clues that may help solve the problem.
2.2 Performance Management
To measure and make available various aspects of network performance so that internet work performance
can be maintained at an acceptable level. Examples of performance variables that might be provided include
network throughput, user response times, and line utilization.
Performance management involves three main steps. First, performance data is gathered on variables of
interest to network administrators. Second, the data is analyzed to determine normal (baseline)
levels. Finally, appropriate performance thresholds are determined for each important variable so
that exceeding these thresholds indicates a network problem worthy of attention.
Management entities continually monitor performance variables. When a performance threshold is exceeded,
an alert is generated and sent to the network management system.
Each of the steps just described is part of the process to set up a reactive system. When performance becomes
unacceptable because of an exceeded user-defined threshold, the system reacts by sending a message.
Performance management also permits proactive methods: For example, network simulation can be used to
project how network growth will affect performance metrics. Such simulation can alert administrators to
impending problems so that counteractive measures can be taken.
2.3 Accounting Management
To measure network utilization parameters so that individual or group uses on the network can be regulated
appropriately. Such regulation minimizes network problems (because network resources can be apportioned
based on resource capacities) and maximizes the fairness of network access across all users.
As with performance management, the first step toward appropriate accounting management is to measure
utilization of all important network resources. Analysis of the results provides insight into current
usage patterns, and usage quotas can be set at this point. Some correction, of course, will be required to
reach optimal access practices. From this point, ongoing measurement of resource use can yield billing
information as well as information used to assess continued fair and optimal resource utilization.
3
2.4 Fault Management
To detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the
network running effectively. Because faults can cause downtime or unacceptable network degradation, fault
management is perhaps the most widely implemented of the ISO network management elements.
Fault management involves first determining symptoms and isolating the problem. Then the problem is fixed
and the solution is tested on all-important subsystems. Finally, the detection and resolution of the problem is
recorded.
2.5 Security Management
To control access to network resources according to local guidelines so that the network cannot be sabotaged
(intentionally or unintentionally) and sensitive information cannot be accessed by those without appropriate
authorization. A security management subsystem, for example, can monitor users logging on to a network
resource and can refuse access to those who enter inappropriate access codes.
Security management subsystems work by partitioning network resources into authorized and unauthorized
areas. For some users, access to any network resource is inappropriate, mostly because such users are usually
company outsiders. For other (internal) network users, access to information originating from a particular
department is inappropriate. Access to Human Resource files, for example, is inappropriate for most users
outside the Human Resources department.
Security management subsystems perform several functions. They identify sensitive network resources
(including systems, files, and other entities) and determine mappings between sensitive network resources
and user sets. They also monitor access points to sensitive network resources and log inappropriate access to
sensitive network resources.
2.6 The Architecture of Network Management
Figure 1 is the architecture of the network management. The network management system manages device
by sending commands to or receiving reports from the agent (a program) in the devices.
The agent is responsible for executing the NMS’s commands and reporting the status of the device it locates in.
4
Figure 1
Figure 2 is an GUI network management system
Figure 2
Managing
Server
Managed
Devices
5
Table 1 is the summary of the functions of the network management :
Goal
Performance
Management
Measure and make available various aspects of network performance so that
internetwork performance can be maintained at an acceptable level
Configuration
Management
Monitor network and system configuration information so that the effects on
network operation of various versions of hardware and software elements can
be tracked and managed.
Accounting
Management
Measure network utilization parameters so that individual or group uses on the
network can be regulated appropriately.
Fault
Management
Detect, log, notify users of, and automatically fix network problems to keep the
network running effectively.
Security
Management
Control access to network resources according to local guidelines so that the
network cannot be sabotaged and so that sensitive information cannot be
accessed by those without appropriate authorization.
Table 1
6
3 Simple Network Management Protocol
SNMP is a protocol that allows for remote and local management of items on the network including servers,
workstations, routers, switches and other managed devices.
Unlike traditional network management methods having complicated commands, SNMP has only few simple
commands for get/set configuration and status.
Figure 3 shows the SNMP management architecture :
Figure 3
Request
Response
Trap
Agent Process
TCP/IP MIB-II
TCP/IP
SNMP Manager
NMS AgentCommand
Server Device
7
4 CPE WAN Management Protocol (TR-069)
The CPE WAN Management Protocol defines a mechanism that encompasses secure auto-configuration of a
CPE, and also incorporates other CPE management functions into a common framework. This protocol is
specified by DSL forum to be Technical Report - 069, TR-069 [8].
It provides the following main capabilities :
4.1 Auto-Configuration and Dynamic Service Provisioning
The protocol allows an ACS to provision a CPE or collection of CPE based on a variety of criteria. The
provisioning mechanism includes specific provisioning parameters and a general mechanism for adding
vendor-specific provisioning capabilities as needed.
4.2 Software/Firmware Image Management
The CPE WAN Management Protocol provides tools to manage downloading of CPE software/firmware
image files. The protocol provides mechanisms for version identification, file download initiation (ACS
initiated downloads and optional CPE initiated downloads), and notification of the ACS of the success or
failure of a file download.
4.3 Status and Performance Monitoring
The protocol provides support for a CPE to make available information that the ACS may use to monitor
the CPE’s status and performance statistics. The protocol defines a common set of such parameters, and
provides a standard syntax for vendors to define additional non-standard
4.4 Diagnostics
The protocol provides support for a CPE to make available information that the ACS may use to diagnose
connectivity or service issues. The protocol defines a common set of such parameters and a general
mechanism for adding vendor-specific diagnostic capabilities.
8
Figure 4 shows the CPE WAN Management Protocol configuration architecture :
Figure 4
4.5 Protocol Components
The CPE WAN Management Protocol comprises several components that are unique to this
protocol and makes use of several standard protocols. Figure 5 shows the protocol stack defined by CPE WAN
Management Protocol.
Figure 5
CPE/ACS Management Application
RPC Methods
SOAP
HTTP
SSL/TLS
TCP/IP
(may haveDHCP)
Internet, ISP network,
Frame Relay…
(TR-069)
TR-104
LAN
WAN
9
Figure 6 shows the descriptions for the above, each protocol in the protocol stack :
Figur
e 6
Protocol
Layer
Description
CPE/ACS
Application
The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively. The
application is locally defined and not specified as part of the CPE WAN Management Protocol
RPC
Methods
The specific RPC methods that are defined by the CPE WAN Management Protocol (TR-69)
SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically
SOAP 1.1 [5]
HTTP HTTP 1.1 [3]
SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 [6] (Secure Socket
Layer), or TLS 1.0 [7] (Transport Layer Security). Use of SSL/TLS is RECOMMENDED but is not required
TCP/IP Standard TCP/IP
10
Figure 7 shows the managing message of the CPE WAN Management Protocol .
Figure 7
POST /dps/TR069 HTTP/1.1
Host: demo.dimark.com:8888
User-Agent: TR69_CPE-1.0
Connection: keep-alive
SOAPAction:
Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF
Content-Type: text/xml
Content-Length: 1361
<SOAP-ENV:Envelope
xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:cwmp="urn:dslforum-org:cwmp-1-0"
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope">
<SOAP-ENV:Header>
<cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID>
</SOAP-ENV:Header>
<SOAP-ENV:Body>
<cwmp:GetParameterNamesResponse>
<ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]">
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
</ParameterList>
</cwmp:GetParameterNamesResponse>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
HTTP message
11
5 Terminology
In this section, it lists all abbreviations used in this document.
5.1 B-NT : Broadband Network Termination
5.2 CPE : Customer Premise Equipment
A DSL B-NT is one of form of broadband CPE. This could be ADSL modem.
5.3 ACS : Auto-Configuration Server
This is a device in the broadband network responsible for auto-configuration of the CPE for advanced
services.
5.4 DSLAM : Digital Subscriber Line Access Multiplexer
The DSLAM at the access provider is the equipment that really allows DSL to happen. A DSLAM takes
connections from many customers and aggregates them onto a single, high-capacity connection to the
Internet. It may provide additional functions including routing or dynamic IP address assignment
for the customers.
5.5 BRAS : Broadband Remote Access Server
This is the connection point to the network(Internet, WAN) and application service providers(ISP,
Corporate Network…etc)
5.6 Parameter
A name-value pair representing a manageable CPE parameter made accessible to an ACS for reading
and/or writing.
5.7 IETF : Internet Engineering Task Force
The Internet Engineering Task Force (IETF) is a large open international community of network designers,
operators, vendors, and researchers concerned with the evolution of the Internet architecture and the
smooth operation of the Internet. It is open to any interested individual.
5.8 RPC : Remote Procedure Call
An RPC is analogous to a function call. Like a function call, when an RPC is made, the calling
arguments(parameters) are passed to the remote procedure and the caller waits for a response to be
returned from the remote procedure.
5.9 SOAP : Simple Object Access Protocol
SOAP provides a simple and lightweight mechanism for exchanging structured and typed information
between peers in a decentralized, distributed environment using XML.
12
5.10 BER : Basic Encoding Rule
This is ASN.1 encoding rules for producing self-identifying and self-delimiting transfer syntax for data
structures described in ASN.1 notations.
BER is a self-identifying and self-delimiting encoding scheme, which means that each data element can
be identified, extracted and decoded individually.
Each data element is encoded as a type identifier, a length description, the actual data elements, and
where necessary, an end-of-content marker. These types of encodings are commonly called
type-length-value or TLV encodings.
13
6 Reference
1. IETF, http://www.ietf.org/
2. DSL Forum, http://www.dslforum.org
3. RFC 2616, Hypertext Transfer Protocol—HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt
4. RFC 2617, HTTP Authentication: Basic and Digest Access Authentication,
http://www.ietf.org/rfc/rfc2617.txt
5. Simple Object Access Protocol (SOAP) 1.1, http://www.w3.org/TR/2000/NOTE-SOAP-20000508
6. The SSL Protocol, Version 3.0, http://www.netscape.com/eng/ssl3/draft302.txt
7. RFC 2246, The TLS Protocol, Version 1.0, http://www.ietf.org/rfc/rfc2246.txt
8. Technical Report 069(TR-069) : CPE WAN Management Protocol, Jeff Bernstein, Tim Spets, May
2004.
9. Simple Network Management Protocol (SNMP), http://www.faqs.org/rfcs/rfc1067.html
10. Abstract Syntax Notation (ASN.1), http://asn1.elibel.tm.fr/en/
14
Appendix A. Comparison between SNMP&CWMP
This section provides the different between SNMP and CWMP :
SNMP CWMP
Support
Organization
IETF (The Internet Engineering
Task Force) [1]
DSL Forum [2]
Protocol
Layer
Application Layer
Transport
Protocol
UDP TCP
Well-Known
Port
UDP Port 161 - SNMP Messages
UDP Port 162 - SNMP Trap
Messages
NON ( HTTPS : 443 )
Encoding
ASN.1 [10] / BER (Basic Encoding
Rule)
XML / SOAP
Security
SNMP V2 --- Community Name
SNNP V3 --- SNMP V2 and Security
for Messages, Access
Control
HTTP Authentication (Basic/Digest) [4]
SSL/TLS
Managed
Objects
MIB (Management Information Base) Parameters
Number of
protocol
defined
managed
objects
Few Many
Identifying
managed
object
object ID (OID) parameter’s name
How to know
managed
objects
pre-defined Dynamic
Active
Contacting
Network Management System (the
system knows the addresses of
managed CPEs)
CPE (CPE knows the address of the
management system)
Contacting
Persistency
Could be hold until the CPE
shutdown / reboot / exception
Having no other request in both end,
terminating the connection.
Table 2
15
Appendix B. Explanation of SOAP message
Figure 8
POST /dps/TR069 HTTP/1.1
Host: demo.dimark.com:8888
User-Agent: TR69_CPE-1.0
Connection: keep-alive
SOAPAction:
Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF
Content-Type: text/xml
Content-Length: 1361
<SOAP-ENV:Envelope
xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:cwmp="urn:dslforum-org:cwmp-1-0"
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope">
<SOAP-ENV:Header>
<cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID>
</SOAP-ENV:Header>
<SOAP-ENV:Body>
<cwmp:GetParameterNamesResponse>
<ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]">
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
</ParameterList>
</cwmp:GetParameterNamesResponse>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
HTTP
headers
SOAP
RPC
elements of the
arrary of structure
type
RPC’s
parameter
name
The arrary
of structure
type
16
The C language form of the above SOAP RPC message is as the following (the meanings of the colors of the
font are the same as the ones of the above SOAP message):
/* Extern function prototype declaration */
extern GetParameterNamesResponse ( ParameterInfoStruct ParameterList[] );
/* Declare the structure data type */
struct ParameterInfoStruct
{
char Name[256+1]; /* Maximum length of the string */
bool Writable;
};
struct ParameterInfoStruct ParameterList[4]; /* Declaring the variable of structure data type */
/* Filling the value of the fields */
strcpy( ParameterList[0].Name, “InternetGatewayDevice.LANDeviceNumberOfEntries” );
ParameterList[0].Writable = 0;
strcpy( ParameterList[1].Name, “InternetGatewayDevice.WANDeviceNumberOfEntries” );
ParameterList[1].Writable = 0;
strcpy( ParameterList[2].Name, “InternetGatewayDevice.LANDevice.” );
ParameterList[2].Writable = 0;
strcpy( ParameterList[3].Name, “InternetGatewayDevice.WANDevice.” );
ParameterList[3].Writable = 0;
/* Calling the RPC */
GetParameterNamesResponse ( ParameterList );
17
Appendix C. Inform message Ethereal PCAP
Captured on 2005-12-26
18
19
20

Weitere ähnliche Inhalte

Was ist angesagt?

Linux Serial Driver
Linux Serial DriverLinux Serial Driver
Linux Serial Driver艾鍗科技
 
Развитие платформы Cisco ASR 9000
Развитие платформы Cisco ASR 9000Развитие платформы Cisco ASR 9000
Развитие платформы Cisco ASR 9000Cisco Russia
 
Introduction to RCU
Introduction to RCUIntroduction to RCU
Introduction to RCUKernel TLV
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI Mustafa Golam
 
3 g ibs walk test report dhk_v1415_tems
3 g ibs walk test report dhk_v1415_tems3 g ibs walk test report dhk_v1415_tems
3 g ibs walk test report dhk_v1415_temsIshaque uddin
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryaliZaryal Social
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Tharindu Sankalpa
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2Febrian ‎
 
Ericsson optimization opti
Ericsson optimization optiEricsson optimization opti
Ericsson optimization optiTerra Sacrifice
 
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLANFlexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLANCisco Canada
 

Was ist angesagt? (20)

Linux Serial Driver
Linux Serial DriverLinux Serial Driver
Linux Serial Driver
 
IS-IS Protocol
IS-IS ProtocolIS-IS Protocol
IS-IS Protocol
 
Ospf area types
Ospf area typesOspf area types
Ospf area types
 
soc
socsoc
soc
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Развитие платформы Cisco ASR 9000
Развитие платформы Cisco ASR 9000Развитие платформы Cisco ASR 9000
Развитие платформы Cisco ASR 9000
 
Introduction to RCU
Introduction to RCUIntroduction to RCU
Introduction to RCU
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
Anr feature in lte
Anr feature in lteAnr feature in lte
Anr feature in lte
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
3 g ibs walk test report dhk_v1415_tems
3 g ibs walk test report dhk_v1415_tems3 g ibs walk test report dhk_v1415_tems
3 g ibs walk test report dhk_v1415_tems
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryali
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
 
Making Linux do Hard Real-time
Making Linux do Hard Real-timeMaking Linux do Hard Real-time
Making Linux do Hard Real-time
 
Part 3 optimization 3G
Part 3 optimization 3GPart 3 optimization 3G
Part 3 optimization 3G
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2
 
Ericsson optimization opti
Ericsson optimization optiEricsson optimization opti
Ericsson optimization opti
 
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLANFlexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 

Andere mochten auch

Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069William Lee
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Axiros
 
More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)William Lee
 
TDD in C - Recently Used List Kata
TDD in C - Recently Used List KataTDD in C - Recently Used List Kata
TDD in C - Recently Used List KataOlve Maudal
 
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 William Lee
 
Usage Note of SWIG for PHP
Usage Note of SWIG for PHPUsage Note of SWIG for PHP
Usage Note of SWIG for PHPWilliam Lee
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Axiros
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUnidesk Corporation
 
Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3William Lee
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies
 
Usage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxUsage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxWilliam Lee
 
Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)William Lee
 
Re-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataRe-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataAlket Cecaj
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcationNir Cohen
 
Hello world在那邊?背景說明
Hello world在那邊?背景說明Hello world在那邊?背景說明
Hello world在那邊?背景說明Wen Liao
 
Asterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationAsterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationWilliam Lee
 
GNU AS簡介
GNU AS簡介GNU AS簡介
GNU AS簡介Wen Liao
 

Andere mochten auch (20)

Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
 
More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)
 
Tr 069
Tr 069Tr 069
Tr 069
 
TDD in C - Recently Used List Kata
TDD in C - Recently Used List KataTDD in C - Recently Used List Kata
TDD in C - Recently Used List Kata
 
Deep C
Deep CDeep C
Deep C
 
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
 
Usage Note of SWIG for PHP
Usage Note of SWIG for PHPUsage Note of SWIG for PHP
Usage Note of SWIG for PHP
 
Tr 069
Tr 069Tr 069
Tr 069
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
 
Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
 
Usage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxUsage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on Linux
 
Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)
 
Re-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataRe-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk Data
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcation
 
Hello world在那邊?背景說明
Hello world在那邊?背景說明Hello world在那邊?背景說明
Hello world在那邊?背景說明
 
Asterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationAsterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log Rotation
 
GNU AS簡介
GNU AS簡介GNU AS簡介
GNU AS簡介
 

Ähnlich wie Introdunction to Network Management Protocols - SNMP & TR-069

Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdfidrissaeed
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network managementbhavikaorg
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementSorath Asnani
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network managementFlightcase1
 
Network management
Network managementNetwork management
Network managementElena Benson
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 

Ähnlich wie Introdunction to Network Management Protocols - SNMP & TR-069 (20)

Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdf
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Lecture week8
Lecture week8Lecture week8
Lecture week8
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network Management
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
 
Network management
Network managementNetwork management
Network management
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 

Mehr von William Lee

Usage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesUsage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesWilliam Lee
 
Viewing Android Source Files in Eclipse (Chinese)
Viewing Android Source Files in Eclipse  (Chinese)Viewing Android Source Files in Eclipse  (Chinese)
Viewing Android Source Files in Eclipse (Chinese)William Lee
 
Usage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerUsage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerWilliam Lee
 
Usage Note of PlayCap
Usage Note of PlayCapUsage Note of PlayCap
Usage Note of PlayCapWilliam Lee
 
Qt4 App - Sliding Window
Qt4 App - Sliding WindowQt4 App - Sliding Window
Qt4 App - Sliding WindowWilliam Lee
 
GTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserGTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserWilliam Lee
 
GTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserGTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserWilliam Lee
 
Note of CGI and ASP
Note of CGI and ASPNote of CGI and ASP
Note of CGI and ASPWilliam Lee
 
Moblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginMoblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginWilliam Lee
 
L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5William Lee
 
C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)William Lee
 
Internationalization(i18n) of Web Page
Internationalization(i18n) of Web PageInternationalization(i18n) of Web Page
Internationalization(i18n) of Web PageWilliam Lee
 
Notes for SQLite3 Usage
Notes for SQLite3 UsageNotes for SQLite3 Usage
Notes for SQLite3 UsageWilliam Lee
 
Android Storage - StorageManager & OBB
Android Storage - StorageManager & OBBAndroid Storage - StorageManager & OBB
Android Storage - StorageManager & OBBWilliam Lee
 
Study of Chromium OS
Study of Chromium OSStudy of Chromium OS
Study of Chromium OSWilliam Lee
 
GNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in GnomeGNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in GnomeWilliam Lee
 
Qt Development Tools
Qt Development ToolsQt Development Tools
Qt Development ToolsWilliam Lee
 
Android Storage - Vold
Android Storage - VoldAndroid Storage - Vold
Android Storage - VoldWilliam Lee
 

Mehr von William Lee (20)

Usage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesUsage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP Languages
 
Viewing Android Source Files in Eclipse (Chinese)
Viewing Android Source Files in Eclipse  (Chinese)Viewing Android Source Files in Eclipse  (Chinese)
Viewing Android Source Files in Eclipse (Chinese)
 
Usage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerUsage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency Walker
 
Usage Note of PlayCap
Usage Note of PlayCapUsage Note of PlayCap
Usage Note of PlayCap
 
Qt4 App - Sliding Window
Qt4 App - Sliding WindowQt4 App - Sliding Window
Qt4 App - Sliding Window
 
GTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserGTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App Chooser
 
GTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserGTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon Chooser
 
Note of CGI and ASP
Note of CGI and ASPNote of CGI and ASP
Note of CGI and ASP
 
Moblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginMoblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) Plugin
 
MGCP Overview
MGCP OverviewMGCP Overview
MGCP Overview
 
L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5
 
C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)
 
Internationalization(i18n) of Web Page
Internationalization(i18n) of Web PageInternationalization(i18n) of Web Page
Internationalization(i18n) of Web Page
 
Notes for SQLite3 Usage
Notes for SQLite3 UsageNotes for SQLite3 Usage
Notes for SQLite3 Usage
 
Android Storage - StorageManager & OBB
Android Storage - StorageManager & OBBAndroid Storage - StorageManager & OBB
Android Storage - StorageManager & OBB
 
Study of Chromium OS
Study of Chromium OSStudy of Chromium OS
Study of Chromium OS
 
GNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in GnomeGNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in Gnome
 
Qt Development Tools
Qt Development ToolsQt Development Tools
Qt Development Tools
 
Qt Animation
Qt AnimationQt Animation
Qt Animation
 
Android Storage - Vold
Android Storage - VoldAndroid Storage - Vold
Android Storage - Vold
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Introdunction to Network Management Protocols - SNMP & TR-069

  • 1. Introduction To Network Management Protocols SNMP & TR-069 William.L wiliwe@gmail.com 2006-01-09
  • 2. Index 1 SUMMARY ................................................................................................................................1 1.1 GENERAL DESCRIPTION ........................................................................................................1 2 WHAT IS NETWORK MANAGEMENT...............................................................................2 2.1 CONFIGURATION MANAGEMENT...........................................................................................2 2.2 PERFORMANCE MANAGEMENT .............................................................................................2 2.3 ACCOUNTING MANAGEMENT................................................................................................2 2.4 FAULT MANAGEMENT ...........................................................................................................3 2.5 SECURITY MANAGEMENT .....................................................................................................3 2.6 THE ARCHITECTURE OF NETWORK MANAGEMENT ...............................................................3 3 SIMPLE NETWORK MANAGEMENT PROTOCOL.........................................................6 4 CPE WAN MANAGEMENT PROTOCOL (TR-069)............................................................7 4.1 AUTO-CONFIGURATION AND DYNAMIC SERVICE PROVISIONING...........................................7 4.2 SOFTWARE/FIRMWARE IMAGE MANAGEMENT ......................................................................7 4.3 STATUS AND PERFORMANCE MONITORING............................................................................7 4.4 DIAGNOSTICS........................................................................................................................7 4.5 PROTOCOL COMPONENTS......................................................................................................8 5 TERMINOLOGY .................................................................................................................... 11 5.1 B-NT : BROADBAND NETWORK TERMINATION ...................................................................11 5.2 CPE : CUSTOMER PREMISE EQUIPMENT..............................................................................11 5.3 ACS : AUTO-CONFIGURATION SERVER ...............................................................................11 5.4 DSLAM : DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER ............................................11 5.5 BRAS : BROADBAND REMOTE ACCESS SERVER .................................................................11 5.6 PARAMETER ........................................................................................................................11 5.7 IETF : INTERNET ENGINEERING TASK FORCE .....................................................................11 5.8 RPC : REMOTE PROCEDURE CALL ......................................................................................11 5.9 SOAP : SIMPLE OBJECT ACCESS PROTOCOL .......................................................................11 5.10 BER : BASIC ENCODING RULE............................................................................................12 6 REFERENCE...........................................................................................................................13 APPENDIX A. COMPARISON BETWEEN SNMP&CWMP....................................................14 APPENDIX B. EXPLANATION OF SOAP MESSAGE..............................................................15 APPENDIX C. INFORM MESSAGE ETHEREAL PCAP .........................................................17
  • 3. 1 1 Summary 1.1 General Description Network management function is one of the most important functions, because it let the manager could monitor the remote device in the distance. Simple Network Management Protocol [9], SNMP, is one of popular network management methods. SNMP is referred to as "simple" because the agent requires minimal software. After the SNMP, the new generation network management protocol, CPE WAN Management Protocol, was developed. Many telecom and service providers are making TR-069 support a requirement for all new CPE purchases and proposals, so we will introduce this new management protocol.
  • 4. 2 2 What is Network Management In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks. The network management has five main functions: 2.1 Configuration Management To monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. Each network device has a variety of version information associated with it. Configuration management subsystems store this information in a database for easy access. When a problem occurs, this database can be searched for clues that may help solve the problem. 2.2 Performance Management To measure and make available various aspects of network performance so that internet work performance can be maintained at an acceptable level. Examples of performance variables that might be provided include network throughput, user response times, and line utilization. Performance management involves three main steps. First, performance data is gathered on variables of interest to network administrators. Second, the data is analyzed to determine normal (baseline) levels. Finally, appropriate performance thresholds are determined for each important variable so that exceeding these thresholds indicates a network problem worthy of attention. Management entities continually monitor performance variables. When a performance threshold is exceeded, an alert is generated and sent to the network management system. Each of the steps just described is part of the process to set up a reactive system. When performance becomes unacceptable because of an exceeded user-defined threshold, the system reacts by sending a message. Performance management also permits proactive methods: For example, network simulation can be used to project how network growth will affect performance metrics. Such simulation can alert administrators to impending problems so that counteractive measures can be taken. 2.3 Accounting Management To measure network utilization parameters so that individual or group uses on the network can be regulated appropriately. Such regulation minimizes network problems (because network resources can be apportioned based on resource capacities) and maximizes the fairness of network access across all users. As with performance management, the first step toward appropriate accounting management is to measure utilization of all important network resources. Analysis of the results provides insight into current usage patterns, and usage quotas can be set at this point. Some correction, of course, will be required to reach optimal access practices. From this point, ongoing measurement of resource use can yield billing information as well as information used to assess continued fair and optimal resource utilization.
  • 5. 3 2.4 Fault Management To detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively. Because faults can cause downtime or unacceptable network degradation, fault management is perhaps the most widely implemented of the ISO network management elements. Fault management involves first determining symptoms and isolating the problem. Then the problem is fixed and the solution is tested on all-important subsystems. Finally, the detection and resolution of the problem is recorded. 2.5 Security Management To control access to network resources according to local guidelines so that the network cannot be sabotaged (intentionally or unintentionally) and sensitive information cannot be accessed by those without appropriate authorization. A security management subsystem, for example, can monitor users logging on to a network resource and can refuse access to those who enter inappropriate access codes. Security management subsystems work by partitioning network resources into authorized and unauthorized areas. For some users, access to any network resource is inappropriate, mostly because such users are usually company outsiders. For other (internal) network users, access to information originating from a particular department is inappropriate. Access to Human Resource files, for example, is inappropriate for most users outside the Human Resources department. Security management subsystems perform several functions. They identify sensitive network resources (including systems, files, and other entities) and determine mappings between sensitive network resources and user sets. They also monitor access points to sensitive network resources and log inappropriate access to sensitive network resources. 2.6 The Architecture of Network Management Figure 1 is the architecture of the network management. The network management system manages device by sending commands to or receiving reports from the agent (a program) in the devices. The agent is responsible for executing the NMS’s commands and reporting the status of the device it locates in.
  • 6. 4 Figure 1 Figure 2 is an GUI network management system Figure 2 Managing Server Managed Devices
  • 7. 5 Table 1 is the summary of the functions of the network management : Goal Performance Management Measure and make available various aspects of network performance so that internetwork performance can be maintained at an acceptable level Configuration Management Monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. Accounting Management Measure network utilization parameters so that individual or group uses on the network can be regulated appropriately. Fault Management Detect, log, notify users of, and automatically fix network problems to keep the network running effectively. Security Management Control access to network resources according to local guidelines so that the network cannot be sabotaged and so that sensitive information cannot be accessed by those without appropriate authorization. Table 1
  • 8. 6 3 Simple Network Management Protocol SNMP is a protocol that allows for remote and local management of items on the network including servers, workstations, routers, switches and other managed devices. Unlike traditional network management methods having complicated commands, SNMP has only few simple commands for get/set configuration and status. Figure 3 shows the SNMP management architecture : Figure 3 Request Response Trap Agent Process TCP/IP MIB-II TCP/IP SNMP Manager NMS AgentCommand Server Device
  • 9. 7 4 CPE WAN Management Protocol (TR-069) The CPE WAN Management Protocol defines a mechanism that encompasses secure auto-configuration of a CPE, and also incorporates other CPE management functions into a common framework. This protocol is specified by DSL forum to be Technical Report - 069, TR-069 [8]. It provides the following main capabilities : 4.1 Auto-Configuration and Dynamic Service Provisioning The protocol allows an ACS to provision a CPE or collection of CPE based on a variety of criteria. The provisioning mechanism includes specific provisioning parameters and a general mechanism for adding vendor-specific provisioning capabilities as needed. 4.2 Software/Firmware Image Management The CPE WAN Management Protocol provides tools to manage downloading of CPE software/firmware image files. The protocol provides mechanisms for version identification, file download initiation (ACS initiated downloads and optional CPE initiated downloads), and notification of the ACS of the success or failure of a file download. 4.3 Status and Performance Monitoring The protocol provides support for a CPE to make available information that the ACS may use to monitor the CPE’s status and performance statistics. The protocol defines a common set of such parameters, and provides a standard syntax for vendors to define additional non-standard 4.4 Diagnostics The protocol provides support for a CPE to make available information that the ACS may use to diagnose connectivity or service issues. The protocol defines a common set of such parameters and a general mechanism for adding vendor-specific diagnostic capabilities.
  • 10. 8 Figure 4 shows the CPE WAN Management Protocol configuration architecture : Figure 4 4.5 Protocol Components The CPE WAN Management Protocol comprises several components that are unique to this protocol and makes use of several standard protocols. Figure 5 shows the protocol stack defined by CPE WAN Management Protocol. Figure 5 CPE/ACS Management Application RPC Methods SOAP HTTP SSL/TLS TCP/IP (may haveDHCP) Internet, ISP network, Frame Relay… (TR-069) TR-104 LAN WAN
  • 11. 9 Figure 6 shows the descriptions for the above, each protocol in the protocol stack : Figur e 6 Protocol Layer Description CPE/ACS Application The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively. The application is locally defined and not specified as part of the CPE WAN Management Protocol RPC Methods The specific RPC methods that are defined by the CPE WAN Management Protocol (TR-69) SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically SOAP 1.1 [5] HTTP HTTP 1.1 [3] SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 [6] (Secure Socket Layer), or TLS 1.0 [7] (Transport Layer Security). Use of SSL/TLS is RECOMMENDED but is not required TCP/IP Standard TCP/IP
  • 12. 10 Figure 7 shows the managing message of the CPE WAN Management Protocol . Figure 7 POST /dps/TR069 HTTP/1.1 Host: demo.dimark.com:8888 User-Agent: TR69_CPE-1.0 Connection: keep-alive SOAPAction: Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF Content-Type: text/xml Content-Length: 1361 <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:cwmp="urn:dslforum-org:cwmp-1-0" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope"> <SOAP-ENV:Header> <cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID> </SOAP-ENV:Header> <SOAP-ENV:Body> <cwmp:GetParameterNamesResponse> <ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]"> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> </ParameterList> </cwmp:GetParameterNamesResponse> </SOAP-ENV:Body> </SOAP-ENV:Envelope> HTTP message
  • 13. 11 5 Terminology In this section, it lists all abbreviations used in this document. 5.1 B-NT : Broadband Network Termination 5.2 CPE : Customer Premise Equipment A DSL B-NT is one of form of broadband CPE. This could be ADSL modem. 5.3 ACS : Auto-Configuration Server This is a device in the broadband network responsible for auto-configuration of the CPE for advanced services. 5.4 DSLAM : Digital Subscriber Line Access Multiplexer The DSLAM at the access provider is the equipment that really allows DSL to happen. A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the Internet. It may provide additional functions including routing or dynamic IP address assignment for the customers. 5.5 BRAS : Broadband Remote Access Server This is the connection point to the network(Internet, WAN) and application service providers(ISP, Corporate Network…etc) 5.6 Parameter A name-value pair representing a manageable CPE parameter made accessible to an ACS for reading and/or writing. 5.7 IETF : Internet Engineering Task Force The Internet Engineering Task Force (IETF) is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual. 5.8 RPC : Remote Procedure Call An RPC is analogous to a function call. Like a function call, when an RPC is made, the calling arguments(parameters) are passed to the remote procedure and the caller waits for a response to be returned from the remote procedure. 5.9 SOAP : Simple Object Access Protocol SOAP provides a simple and lightweight mechanism for exchanging structured and typed information between peers in a decentralized, distributed environment using XML.
  • 14. 12 5.10 BER : Basic Encoding Rule This is ASN.1 encoding rules for producing self-identifying and self-delimiting transfer syntax for data structures described in ASN.1 notations. BER is a self-identifying and self-delimiting encoding scheme, which means that each data element can be identified, extracted and decoded individually. Each data element is encoded as a type identifier, a length description, the actual data elements, and where necessary, an end-of-content marker. These types of encodings are commonly called type-length-value or TLV encodings.
  • 15. 13 6 Reference 1. IETF, http://www.ietf.org/ 2. DSL Forum, http://www.dslforum.org 3. RFC 2616, Hypertext Transfer Protocol—HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt 4. RFC 2617, HTTP Authentication: Basic and Digest Access Authentication, http://www.ietf.org/rfc/rfc2617.txt 5. Simple Object Access Protocol (SOAP) 1.1, http://www.w3.org/TR/2000/NOTE-SOAP-20000508 6. The SSL Protocol, Version 3.0, http://www.netscape.com/eng/ssl3/draft302.txt 7. RFC 2246, The TLS Protocol, Version 1.0, http://www.ietf.org/rfc/rfc2246.txt 8. Technical Report 069(TR-069) : CPE WAN Management Protocol, Jeff Bernstein, Tim Spets, May 2004. 9. Simple Network Management Protocol (SNMP), http://www.faqs.org/rfcs/rfc1067.html 10. Abstract Syntax Notation (ASN.1), http://asn1.elibel.tm.fr/en/
  • 16. 14 Appendix A. Comparison between SNMP&CWMP This section provides the different between SNMP and CWMP : SNMP CWMP Support Organization IETF (The Internet Engineering Task Force) [1] DSL Forum [2] Protocol Layer Application Layer Transport Protocol UDP TCP Well-Known Port UDP Port 161 - SNMP Messages UDP Port 162 - SNMP Trap Messages NON ( HTTPS : 443 ) Encoding ASN.1 [10] / BER (Basic Encoding Rule) XML / SOAP Security SNMP V2 --- Community Name SNNP V3 --- SNMP V2 and Security for Messages, Access Control HTTP Authentication (Basic/Digest) [4] SSL/TLS Managed Objects MIB (Management Information Base) Parameters Number of protocol defined managed objects Few Many Identifying managed object object ID (OID) parameter’s name How to know managed objects pre-defined Dynamic Active Contacting Network Management System (the system knows the addresses of managed CPEs) CPE (CPE knows the address of the management system) Contacting Persistency Could be hold until the CPE shutdown / reboot / exception Having no other request in both end, terminating the connection. Table 2
  • 17. 15 Appendix B. Explanation of SOAP message Figure 8 POST /dps/TR069 HTTP/1.1 Host: demo.dimark.com:8888 User-Agent: TR69_CPE-1.0 Connection: keep-alive SOAPAction: Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF Content-Type: text/xml Content-Length: 1361 <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:cwmp="urn:dslforum-org:cwmp-1-0" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope"> <SOAP-ENV:Header> <cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID> </SOAP-ENV:Header> <SOAP-ENV:Body> <cwmp:GetParameterNamesResponse> <ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]"> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> </ParameterList> </cwmp:GetParameterNamesResponse> </SOAP-ENV:Body> </SOAP-ENV:Envelope> HTTP headers SOAP RPC elements of the arrary of structure type RPC’s parameter name The arrary of structure type
  • 18. 16 The C language form of the above SOAP RPC message is as the following (the meanings of the colors of the font are the same as the ones of the above SOAP message): /* Extern function prototype declaration */ extern GetParameterNamesResponse ( ParameterInfoStruct ParameterList[] ); /* Declare the structure data type */ struct ParameterInfoStruct { char Name[256+1]; /* Maximum length of the string */ bool Writable; }; struct ParameterInfoStruct ParameterList[4]; /* Declaring the variable of structure data type */ /* Filling the value of the fields */ strcpy( ParameterList[0].Name, “InternetGatewayDevice.LANDeviceNumberOfEntries” ); ParameterList[0].Writable = 0; strcpy( ParameterList[1].Name, “InternetGatewayDevice.WANDeviceNumberOfEntries” ); ParameterList[1].Writable = 0; strcpy( ParameterList[2].Name, “InternetGatewayDevice.LANDevice.” ); ParameterList[2].Writable = 0; strcpy( ParameterList[3].Name, “InternetGatewayDevice.WANDevice.” ); ParameterList[3].Writable = 0; /* Calling the RPC */ GetParameterNamesResponse ( ParameterList );
  • 19. 17 Appendix C. Inform message Ethereal PCAP Captured on 2005-12-26
  • 20. 18
  • 21. 19
  • 22. 20