SNMP Tutorial
SNMP Tutorial
(DPS Telecom)
Since its creation in 1988 as a short-term solution to manage elements in the growing Internet and
other attached networks, SNMP has achieved widespread acceptance. SNMP was derived from its
predecessor SGMP (Simple Gateway Management Protocol) and was intended to be replaced by a
solution based on the CMIS/CMIP (Common Management Information Service/Protocol) architecture.
This long-term solution, however, never received the widespread acceptance of SNMP.
The manager and agent use a Management Information Base (MIB) and a relatively small set of
commands to exchange information. The MIB is organized in a tree structure with individual variables,
such as point status or description, being represented as leaves on the branches. A long numeric tag
or object identifier (OID) is used to distinguish each variable uniquely in the MIB and in SNMP
messages.
The TRAP message allows the agent to spontaneously inform the manager of an "important" event.
As you can see, most of the messages (GET, GET-NEXT, and SET) are only issued by the SNMP
manager. Because the TRAP message is the only message capable of being initiated by an agent, it
is the message used by DPS Remote Telemetry Units (RTUs) to report alarms. This notifies the
SNMP manager as soon as an alarm condition occurs, instead of waiting for the SNMP manager to
ask.
Each SNMP element manages specific objects with each object having specific characteristics. Each
object / characteristic has a unique object identifier (OID) consisting of numbers separated by decimal
points (i.e., 1.3.6.1.4.1.2682.1). These object identifiers naturally form a tree as shown below. The
SNMP MIB associates each OID with a readable label (i.e., dpsRTUAState) and various other
parameters related to the object. The MIB then serves as a data dictionary or code book that is used
to assemble and interpret SNMP messages.
When an element sends an SNMP TRAP packet, it can include OID and value information (bindings)
to clarify the event. DPS remote units send a comprehensive set of bindings with each TRAP to
maintain traditional telemetry event visibility. Well-designed SNMP managers can use the bindings to
correlate and manage the events. SNMP managers will also generally display the readable labels to
facilitate user understanding and decision-making.
This part of our tutorial on the Simple Network Management Protocol (SNMP) examines the
communication between SNMP managers and SNMP agents. Basic serial telemetry protocols, like
TBOS, are byte oriented with a single byte exchanged to communicate. Expanded serial telemetry
protocols, like TABS, are packet oriented with packets of bytes exchanged to communicate. The
packets contain header, data and checksum bytes. SNMP is also packet oriented with the following
SNMP v1 packets (Protocol Data Units or PDUs) used to communicate:
Get
GetNext
Set
Trap
The image below shows the SNMP packet formats. Each variable binding contains an identifier, a
type and a value (if a Set or response). The agent checks each identifier against its MIB to determine
whether the object is managed and changeable (if processing a Set). The manager uses its MIB to
display the readable name of the variable and sometimes interpret its value.
In this fourth article in our series, we continue to examine the Simple Network Management Protocol
(SNMP) focusing specifically on the layered communication model used to exchange information. Our
last article focused on the structure of SNMP messages, however an SNMP message is not sent by
itself. It is wrapped in the User Datagram Protocol (UDP), which in turn is wrapped in the Internet
Protocol (IP). These are commonly referred to as layers and are based on a four-layer model
developed by the Department of Defense (you may recall the DoD origins of the Internet).
the assembled packet is actually interfaced to some kind of transport media (i.e., twisted pair copper,
RG58 co-axial or fiber). While this multi-layer model may seem a bit confusing, it effectively isolates
the tasks of communication and ultimately assists in designing and implementing a network.
An SNMP message passes through the protocol layers at both the manager and the
agent. Each layer addresses a specific communication task.
ICMP echo requests and responses (Pings) provide some information regarding the proper
functioning of the IP layer. SNMP processing indicators can be used to verify the passage of the
SNMP packet through the UDP layer and the functioning of the Application layer. Each step can be
verified independently until all steps are working correctly for end-to-end communication.
SNMP is a standard protocol that has wide acceptance in the industry and is flexible enough to
describe almost anything. Because of these advantages, many network managers have come to
believe that SNMP should be used for all network monitoring applications.
Not All SNMP Managers Can Provide Network Visbility and Control
SNMP certainly has its place in an effective telecom network management solution, but this doesn't
mean that any off-the-shelf SNMP manager can provide adequate visibility and control of your
network.
There are seven common mistakes network managers typically make when integrating SNMP and
non-SNMP monitoring. Your SNMP implementation will be successfully only if you can avoid them.
1. Selecting an SNMP system that doesn't provide complete, precise alarm descriptions
A basic SNMP manager doesn't record the location, time, severity, or a precise description of
alarm events. To adapt an off-the-shelf SNMP manager to monitor these factors, you must create
and maintain a master alarm list representing all the monitored points in your network - and then
also create and maintain a database associating all the traps that may be sent to the SNMP
manager with the alarms on that list.
alarm. In the example of the negligent system operator, it would be impossible to determine who
had made the mistake or to assign responsibility for the resulting problems.
The need for extensive customization eliminates the advantage of using a simple open standard, and
it is difficult to justify significant development costs after purchasing an already expensive SNMP
manager. Why take the time, trouble, and expense to recreate capabilities that are already present in
a high-quality, SNMP-capable network alarm management system?
SNMP can be an effective tool, but it's only one item in your network alarm monitoring toolkit, and it
can be used more effectively when it is part of a total network monitoring solution.