Upload
beverly-dickerson
View
218
Download
4
Tags:
Embed Size (px)
Citation preview
NETWORK MANAGEMENT
Course Supervisor
MUHAMMAD KHALID KHAN
Do you really want good marks?
• Invest at-least 200 hours on this course. Any thing less may result in some thing that most probably you would not LIKE.
• 120 hours for the course-work and 80 hours for the project.
Course Material
Books: Network Management, Principles and Practices By Mani Sobramanian
Reference Books:Network Management, A Practical PerspectiveBy Allan Leinwend and Karen Fang
SNMP, SNMPv2 and CMIP, The Practical Guide toNetwork Management Standards By William Stallings
Marks Distribution
• Hourly: 30 (n-1)
• Sessional: 30 – Project: 15– Quizzes: 10– Assignment: 5
• Final: 40
ANY QUESTION
Telephone Network
• Characteristics:– Reliable - does what is expected of it– Dependable - always there when you need
it. (remember 911?)– Good quality (connection) - hearing each
other well
• Reasons:– Good planning, design, and implementation– Good operation and management of
network
Regional CenterClass 1 switch
Sectional CenterClass 2 switch
Primary CenterClass 3 switch
Toll CenterClass 4 switch
End OfficeClass 5 switch
Regional CenterClass 1 switch
Sectional CenterClass 2 switch
Primary CenterClass 3 switch
Toll CenterClass 4 switch
End OfficeClass 5 switch
Voice Voice
To otherRegional centersSectional centersPrimary centersToll centersEnd offices
To otherPrimary centersToll centersEnd offices
To otherClass 4 toll pointsEnd offices
Figure 1.1 Telephone Network Model
Legend:Loop
Direct Trunk
Toll-Connecting Trunk
Toll Trunk
Telephone Network Model
• Notice the hierarchy of switches
• Primary and secondary routes programmed
• Automatic routing
• Where is the most likely failure?
• Use of Operations Systems to ensure QoS
Telephone Network
• Monitor telephone network parameters– S/N ratio, transmission loss, call blockage, etc.
• Real-time management of network• Trunk (logical entity between switches) maintenance
system measures loss and S/N. Trunks not meeting QoS are removed before customer notices poor quality
• Traffic measurement systems measure call blockage. Additional switch planned to keep the call blockage below acceptable level
• Operations systems are distributed at central offices• Network management done centrally from Network
Operations Center (NOC)
Operations Systems / NOC
Data and Telecommunication Network
Terminal
Modem
Voice
Terminal
Modem Modem
Voice
Host
Data communication network
Telecommunication network
Figure 1.3 Data and Telecommunication Networks
Loop Loop Loop
• Computer data is carried over long distance by telephone (telecommunication network)
• Output of telephone is analog and output of computers is digital
• Modem is used to “modulate” and “demodulate” computer data to analog format and back
• Clear distinction between the two networks is getting fuzzier with modern multimedia networks
Data and Telecommunication Network
Mainframe
Communicationscontroller
Communicationscontroller
Clustercontroller
Clustercontroller
Figure 1.5 IBM Systems Network Architecture Model
Workstation Workstation
IBM SNA Architecture
• IBM System Network Architecture (SNA) is a major step in network architecture
• SNA is based on multitude of (dumb) terminals accessing a mainframe host at a remote location
IBM SNA Architecture
DCE with LAN
Ethernet
Workstation
Workstation
Host
Host
Workstation
(a) Hosts and Workstations on Local LAN
DCE.. Distributed Computing Environment
• Driving technologies for DCE:– Desktop processor– LAN– LAN - WAN network
DCE with LAN
LAN-WAN network
LAN A LAN B
LAN C
Bridge /Router
Bridge /Router
Bridge /Router
WANcommunication link
LAN-WAN network
• Major impacts of DCE:– No more monopolistic service provider– No centralized IT controller– Hosts doing specialized function– Client/Server architecture formed the core
of DCE network
Client/Server Model
• Post-office analogy; clerk the server, and the customer the client
• Client always initiates requests
• Server always responds
• Notice that control is handed over to the receiving entity.
Client/Server Examples
Client/Server Examples
TCP/IP Based Networks
• TCP/IP is a suite of protocols• Internet is based on TCP/IP• IP is Internet protocol at the network layer level• TCP is connection-oriented transport protocol
and ensures end-to-end connection• UDP is connectionless transport protocol and
provides datagram service• Internet e-mail and much of the network mgmt.
messages are based on UDP/IP• ICMP component (used in ping) of TCP/IP suite
Architecture, Protocols and Standards
• Communication architecture– Modeling of communication systems, comprising
• functional components and• operations interfaces between them
• Communication protocols– Operational procedures
• intra- and inter-modules
• Communication standards– Agreement between manufacturers on protocols
of communication equipment on• physical characteristics and • operational procedures
Communication Architecture
Communication Architecture
Communication Architecture
• Inter-layer interface: user and service provider
• Peer-layer protocol interface
• Analogy of hearing-impaired student
• Role of intermediate systems
• Gateway: Router with protocol conversion as gateway to an autonomous network or subnet
OSI Reference Model
OSI Reference Model
OSI Reference Model
PDU Communication Model
Network Management
• Network management is the process of controlling a complex data network to maximize its efficiency and productivity
• The overall goal of network management is to help with the complexity of a data network and to ensure that data can go across it with maximum efficiency and transparency to the users
Network Management and it’s Functional Grouping
Network Network Network
ProvisioningOperation Maintenance
Planning Fault Management Network Installation
Design Configuration Management Network Repairs
Performance Management Network Test
Security Management Trouble-shooting
Accounting Management
Typical Network Management System
Network Management Objectives
At first glance and without starting a complex research, asnetwork end-users, it is obvious that we expect fast, secureand reliable connections, as network manager we wouldlike to easily configure and control network access andresources, and as corporate manager we expect a lowusage cost.
• Controlling Corporate strategic assets: Networks and distributed computing resources are increasingly vital resources for most organizations. Without effective control, these resources do not provide the pay-back that corporate management requires.
Network Management Objectives
• Controlling complexity: The continued growth in the number of network components, end users, interfaces, protocols, and vendors threatens management with loss of control over what is connected to the network and how network resources are used.
• Improving services: End users expect the same or improved service as the information and computing resources of the organization grow and distribute.
Network Management Objectives • Balancing various needs: The information and
computing resources of an organization must provide a spectrum of end users with various applications at given levels of support, with specific requirements in the areas of performance, availability, and security. The network manager must assign and control resources to balance these various needs.
• Reducing down-time: As the network resources of an organization become more important, minimum availability requirement approach 100 percent. In addition to proper redundant design, network management has an indispensable role to play in ensuring high availability of its resources.
• Controlling costs: Resource utilization must be monitored and controlled to enable essential end-user needs to be satisfied with reasonable cost.
Network Management
• The International Organization for Standardization (ISO) Network Management Forum divided network management into five functional areas:– Fault Management– Configuration Management– Security Management– Performance Management– Accounting Management
Fault Management
• Is the process of locating problems, or faults, on the data network
• It involves the following steps:– Discover the problem– Isolate the problem– Fix the problem (if possible)
Configuration Management
• The configuration of certain network devices controls the behavior of the data network
• Configuration management is the process of finding and setting up (configuring) these critical devices
Security Management
• Is the process of controlling access to information on the data network
• Provides a way to monitor access points and records information on a periodic basis
• Provides audit trails and sounds alarms for security breaches
Performance Management
• Involves measuring the performance of the network hardware, software, and media
• Examples of measured activities are:– Overall throughput– Percentage utilization– Error rates– Response time
Accounting Management
• Involves tracking individual’s utilization and grouping of network resources to ensure that users have sufficient resources
• Involves granting or removing permission for access to the network
Network Management Protocols
• A simple protocol defines common data formats and parameters and allows for easy retrieval of information
• A complex protocol adds some change capability and security
• An advanced protocol remotely executes network management tasks
Network Management Protocols
• So where is technology today?– The most common protocols are:
• SNMP (Simple Network Management Protocol) • SNMPv2 (SNMP version 2) • CMIS/CMIP (Common Management Information
Services/Common Management Information Protocol)
• RMON (Remote Monitoring)
Network Management Protocols
• SNMP is beyond the simple protocol with adequate monitoring capabilities and some change capabilities
• SNMPv2 greatly enhances the SNMP feature set
• CMIP approaches the advanced tool, but implementation issues have limited its use
Network Management Protocols
• These protocols do not state how to accomplish the goals of network management
• They give methods to monitor and configure network devices
• The challenge to analyze the information in an effective manner rests with software engineers who write network management applications
Network Management Platform
• Historically, network management revolved around multiple systems, each managing one specific set of components on the data network
• Restrictions of money, physical space, and technical expertise led to the desire to have the components managed by a single system that would show their interconnections on a network map
Network Management Platform
• A network management platform is a software package that provides the basic functionality of network management for different network components
• The goal for the platform is to provide generic functionality for managing a variety of network devices
Network Management Platform
• Basic features for any platform to include are:– Graphical User Interface (GUI)– Network Map– Database Management System (DBMS)– Standard Method to Query Devices– Customizable Menu System– Event Log
Network Management Platform
• Additional features for a platform include:– Graphing Tools– Application Programming Interface (API)– System Security
Network Management Platform
• Management Platforms that exist today– Sun’s SunNet Manager– HP’s OpenView– IBM’s Netview for AIX– Cabletron’s Spectrum
Network Management Architectures
• The Network Management Platform can use various architectures to provide functionality
• The 3 most common are:– Centralized– Hierarchical– Distributed
Centralized Architecture
• The Network Management Platform resides on a single computer system
• For full redundancy, the computer system is backed up by another system
• Can allow access and forward events to other consoles on network
Centralized Architecture
Centralized Architecture
• Pros:– Single location to view events & alerts– Single place to access network management
applications and information– Security is easier to maintain
Centralized Architecture
• Cons:– Single system is not redundant or fault
tolerant– As network elements are added, may be
difficult or expensive to scale system to handle load
– Having to query all devices from a single location
Hierarchical Architecture
• Uses multiple computer systems– One system acting as the central server– Other systems working as clients
• Central server requires backups for redundancy
Hierarchical Architecture
Hierarchical Architecture
• Key features:– Not dependent on a single system– Distribution of network management tasks– Network monitoring distributed throughout
network– Centralized information storage
Hierarchical Architecture
• Pros:– Multiple systems to manage the network
• Cons:– Information gathering is more difficult and time
consuming– The list of managed devices managed by
each client needs to be predetermined and manually configured
Distributed Architecture
• Combines the centralized and hierarchical architectures
• Uses multiple peer network management systems– Each peer can have a complete database – Each peer can perform various tasks and
report back to a central system
Distributed Architecture
Distributed Architecture
• Contains advantages from central & hierarchical architectures– Single location for all network information, alerts
& events– Single location to access all management
applications– Not dependent on a single system– Distribution of network management tasks– Distribution of network monitoring throughout the
network
Other Topics
• Sniffers
• RMON
• Network Statistics