0% found this document useful (0 votes)
49 views68 pages

Chapter 2 - Telecommunication and NW

Uploaded by

zekarias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views68 pages

Chapter 2 - Telecommunication and NW

Uploaded by

zekarias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

Network Management and

Security

Chapter 2
Telecommunications and broadband network
management

Gebeyehu B. (Dr. of Eng.) Asct Professor

[email protected]

Network management and security Chapter 2


Chapter contents

Basic concepts and objectives

Network Management Protocols (SNMP, CMIP, etc.)

Telecommunication Management Network (TMN) Models and


Architecture Styles

ATM and Broadband Access Network Management

Network Management Tools and Applications

Network management and security Chapter 2


Basic concepts
Telecommunications Management Network :
A TMN is a support network that interfaces to the
telecommunications network to provide the means for transporting
and processing Operations, Administration, Maintenance,
Provisioning, and Management (OAM&P) information.
Relationship of TMN to Telecommunications Network

Network management and security Chapter 2


Basic concepts
Telecommunications Management Network :

It provides a framework for achieving interconnectivity and


communication across heterogeneous operations systems and
telecommunications networks.

TMN was developed by the International Telecommunications Union


(ITU) as an infrastructure to support management and deployment of
dynamic telecommunications services.

Network management and security Chapter 2


Basic concepts and objectives
Identify the principal components of telecommunications networks
and key networking technologies.

Identify the different types of networks.

Describe how the Internet and Internet technology work and how
they support communication and e-business.

Describe the principal technologies and standards for wireless


networking, communication, and Internet access.

Describe radio frequency identification and wireless sensor networks


and identify why these are valuable business technologies.
5

Network management and security Chapter 2


Basic concepts and objectives
Networking and Communication Trends

Convergence:
Telephone networks and computer networks converging into
single digital network using Internet standards

Broadband:
It is a determinant factor to the performance and speed of
internet access

Broadband wireless:
Voice, data communication are increasingly taking place over
broadband wireless platforms

Network management and security Chapter 2


Network Management Protocols (SNMP, CMIP, etc.)
TMN (Telecommunication Management Network) is ITU-T’s network
management concept.
OSI-management is CMISE (Common Management Information Service
Element), CMIP (Common Management Information Protocol). It is
defined as joint ISO, ITU-T standard.
Often TMN is meant to be the synonym of OSI-management as CMISE
was selected as Q3. Then Qx meant CMISE with shortened stack, i.e., not
on the OSI-stack X.25, Transport, Session, Presentation.
Currently TMN does not see OSI-management as an essential part of
TMN and Q3 may be some other protocol. One possibility is TMN where
CMISE is on top of CORBA. This is included in the Open Distributed
Management Architecture ODMA.
TMN MIBs (Management Information Bases) are defined using GDMO
(Guidelines for Definition of Managed Objects). 7

Network management and security Chapter 2


Network Management Protocols (SNMP, CMIP, etc.)
TMN
Management of services is often a part of network management.

The former and still present situation is that there are very many different
management systems which are centrally managed by a small group of people.
It becomes complicated and the need for a standard solution for management
was seen in late 80-ies.

TMN standards M.3010 Principles of TNM from ITU-T and CMISE/CMIP


recommendations X.700-series from ISO (called the OSI-management) were
seen as the solution in the beginning of the 90-ies.

Currently TMN is not the only, and certainly not the most fashionable,
solution, but the setting should be remembered. NM is a very large task and
the situation is still that there are several partly automatic, partly manual
management systems.

TMN is being developed by ITU-T,ETSI, NMF (Network Management


Forum). 8

Network management and security Chapter 2


Network Management Protocols (SNMP, CMIP, etc.)
TMN
JIDM (Joint Inter Domain Management), joint activity of OMG and NTF puts
TMN on CORBA setting.
There is new work going on in ISO: ODMA Open Distributed Management
Architecture which applies ODP to TMN and basically puts CMISE on top of
CORBA translating GDMO/ASN.1 MIBs to IDL.

Therefore, we can still say that TMN may be the future solution.

SNMP
SNMP is a tool (protocol) that allows for remote and local management of
items on the network including servers, workstations, routers, switches and
other managed devices.
Comprised of agents and managers
Agent process running on each managed node collecting information about the device it is
running on
Manager process running on a management workstation that requests information about devices
on the network. 9

Network management and security Chapter 2


Network Management Protocols (SNMP, CMIP, etc.)
SNMP
Advantage of SNMP
Standardized

universally supported

Extendible

Portable

allows distributed management access

lightweight protocol

SNMP is a “client pull” model: The management system (client) “pulls”


data from the agent (server).

SNMP is a “server push” model: The agent (server) “pushes” out a trap
message to a (client) management system 10

Network management and security Chapter 2


Telecommunication Management Network (TMN)
Models and Architecture Styles
TMN
provides a framework for telecommunications management.
Example:
Remote operation of equipment,
Collection of information which helps faults to be dealt with proactively
before a complete failure (e.g., Tsunami)
Easier interworking of equipment from different manufacturers,
Abstract view of information (hide the physical detail)

11

Network management and security


Telecommunication Management Network (TMN)
Models and Architecture Styles

12

Network management and security Chapter 2


Telecommunication Management Network (TMN)
Models and Architecture Styles
In Telecommunication Management Network (TMN)
Item of telecommunication equipment is an element
Elements that are managed by the TMN are called network elements (NE)
The aim of the TMN is to
Provide a definition of how management information is organized.
The functional architecture
Contains a set of functional blocks,
It separates out the management functions

Network Element Function (NEF)


is implemented in one of the add/drop multiplexers in the ring
Operations System Function (OSF) WSF
resides in software in a computer
Workstation Function (WSF)
provides a graphical user interface (GUI) to the operator OSF
13
NEF NEF
Network management and security Chapter 2
Telecommunication Management Network (TMN)
Models and Architecture Styles
Network element function (NEF)
Provides a home within the telecommunication WSF OSF
network for the agent that will manage the
network element.
This block presents activities –
Switching,
Alarm notification and
performance –
Communicates operations from the manager to NEF NEF
the network element.
Provides the communication boundary between
the management and telecommunication
networks. WSF OSF
Workstation function (WSF)
Convert TMN information into a format that can be easily
understood by the user –
In the opposite direction it will convert user input into a form
14
usable by the TMN.
Sits across the TMN boundary, and Usable by operators. NEF NEF
Telecommunication Management Network (TMN)
Models and Architecture Styles
The physical architecture of the TMN follows very closely the
organization of the functional architecture

Each of the reference points is replaced with an interface.

15
Telecommunication Management Network (TMN)
Models and Architecture Styles
The physical architecture of the TMN follows very closely the
organization of the functional architecture
Each of the reference points is replaced with an interface.
An organized architecture for a conceptually separate management
network to interconnect NMSs & equipment using standardized
functions (e.g., FCAPS)
Information Models (i.e., MIB)
Network Management Protocols (CMIP as base, but SNMP supported)
NM expertise and tools (e.g., event correlator; NM m&p)

Which is important to:


Ability to scale NMSs for large number of devices
Support for new technologies, equipment and services
Promote flexibility and system integration based on modularity and interoperability
16
Defining a common information model (i.e., an agent MIB)
Telecommunication Management Network (TMN) Models
and Architecture Styles
An architecture of Network Management in the TMN Environment
TMN Conceptually Separate Management Network

Management Management Management


System System System

Data Communication Workstation


Network (DCN)

Terminal Frame
Relay ATM
Server Router Router

Telecommunications network

• Interconnection of service providers and user management infrastructures


17
Telecommunication Management Network (TMN)
Models and Architecture Styles
The generic TMN architecture
Functional Architecture - provides the means to process and transport
information
Function Blocks (packaging FCAPSs, protocol converters, workstation
functions)
Reference Points (Conceptual interfaces between Management Systems)
Information Architecture - provides an object-oriented approach for
management-oriented information exchanges
Management Information Model (MIBs)
Manager/Agent Relationship

Physical Architecture
Management System Architecture
Interface Realization
18

Network management and security Chapter 2


Telecommunication Management Network (TMN)
Models and Architecture Styles
TMN functional architecture is based on a number of TMN function
blocks:

OSF (Operations Systems Function)


TMN

MF (Mediation Function) OSF

WSF
WSF (Work Station Function)
MF

NEF (Network Element Function)

QAF NEF
QAF (Q Adaptor Function)
19

Network management and security Chapter 2


Telecommunication Management Network (TMN) Models
and Architecture Styles
The TMN function blocks
Operations Systems Function (OSF) block:
For monitoring/coordinating and/or controlling telecommunications functions
including management functions.

Network Element Function (NEF) block:


For the purpose of being monitored and/or controlled.

Workstation Function (WSF) block:


For interpreting TMN information for the management information user.
Support for interfacing to a human user.

Mediation Function (MF) block:


Acts on information passing between an OSF and NEF (or QAF) to achieve smooth and
efficient communication.
MF blocks may store, adapt, filter, threshold, and condense information.

Q Adaptor Function (QAF) block:


20
To connect those non-TMN NEFs and OSFs to TMN. To translate between a TMN reference
point and a non-TMN reference point (e.g., proprietary).
Telecommunication Management Network (TMN)
Models and Architecture Styles
The TMN physical architecture
The TMN is represented by several building blocks that provide an overall
embodiment of the management issues and functions of TMN.
TMN build blocks
Operations System (OS)
The OS is the system performing OSFs.
Mediation Device (MD)
The MD is the device performing MFs.

Q Adaptor (QA)
The QA is a device which connects NEs or OSs
with non-TMN compatibale interfaces to Qx or
Q3 interfaces.
Network Element (NE)
The NE is comprised of telecommunication
equipment (in
groups, parts, or the whole) and support
equipment that 21
performs NEFs.
Telecommunication Management Network (TMN)
Models and Architecture Styles
The TMN build blocks ….
Workstation (WS)
The WS is the system performing WSFs.
The WSFs translate information at the f reference point to a displayable format at the g
reference point, and vice versa.

Data Communication Network (DCN)


The DCN is a communication network within a TMN which supports the data communication
function (DCF). The DCN represents an implementation of the OSI layers

22

Network management and security Chapter 2


Telecommunication Management Network (TMN)
Models and Architecture Styles
TMN vs. OSI management
TMN follows OSI systems management concept.

TMN uses OSI Guidelines for the Definition of Managed Objects (GDMO) to
define managed objects. (Management Information Modeling)

TMN uses OSI CMIS/CMIP to exchange management information.


(Management Communication Protocol)

TMN uses OSI Systems Management Functions (SMF) and defines new
management functions. (Systems Management Functions)

TMN may use FTAM for file transfer type service.


23

Network management and security Chapter 2


Telecommunication Management Network (TMN)
Models and Architecture Styles
The architecture of TMN services and functions

Telecommunications Management Services and Components


Management of Management of Management of
Transmission Paths Switched Network Customer Services
...
Telecommunications Management Functions
Provisioning Monitoring
Fault
Verification ... Restoration
correction

OSI Systems Management Functions

Log Control
SMF
Event Report
SMF
Object
SMF
... Accounting
Meter SMF

ACSE + ROSE + CMISE


24

Network management and security Chapter 2


Telecommunication Management Network (TMN)
Models and Architecture Styles
The TMN logical layer model
TMN supplies a model of logical layers that define or suggest the management
level for specific functionality.

Business Management Layer


Service Management Layer
Network Management Layer
Element Management Layer
Network Element Layer

25

Network management and security Chapter 2


Telecommunication Management Network (TMN)
Models and Architecture Styles
The key technologies for TMN
Managed Object Modeling and Interpretation.
Underlying Management Communication Protocols (CMIS/P).
Management Platform Based on Standard OSI Systems Management
Functions.
Interoperability Issues Due to the Permitted Options in OSI Protocols.
Object-Oriented Technology.
Distributed Processing Technology
Q Adaption of Existing Proprietary Management Applications.
Domain Knowledge in Telecommunications.

26

Network management and security Chapter 2


ATM and Broadband Access Network Management

ATM: Asynchronous Transfer Mode


It is ITU standard for high-speed (155Mbps to 622 Mbps and
higher) Broadband Integrated Service Digital Network (B-ISDN)
architecture
Integrated, end-end transport of carry voice, video, data
meeting timing/QoS (quality of service) requirements of voice,
video (versus Internet best-effort model)
“next generation” telephony: technical roots in telephone world
The idea of flexible and efficient packet switching
Support connection-oriented and virtual circuit network
Scale to high performance switch fixed size packet
Support low jitter voice small size packet 27

Network management and security Chapter 2


ATM and Broadband Access Network Management
Therefore, ATM technology works based on:
VP / VC: virtual protocol/virtual circuit
Fixed packet size or cell
Small packet size (53 bytes)
Statistical multiplexing
Integrated services
ATM Management specifications available
for both SNMP and OSI management
implementations
SNMP agent built in ATM device
System, Interfaces, Interface types, transmission carrier groups (T1,
28
T3, SONET), and ATM object groups are monitored
ATM and Broadband Access Network Management
ATM relationship to TMN layer architecture

ITU-T definition of five-layer model to manage telecommunications network


ATM heavily used in WAN, responsibility of public service providers
The bottom three layers apply to ATM management 29
Reference points are abstract interfaces between layers
ATM and Broadband Access Network Management

VC: virtual circuit concept:


Logical connection that is first established using signaling
protocol
Route from the source to the destination is chosen
The same route is used for all packets of the connection

No routing decision for every cell


No dedicated capacity
Packet switching to enable statistical multiplexing

Each packet contains enough information for node (switch) to


forward it towards the destination
30

Network management and security Chapter 2


ATM and Broadband Access Network Management
ATM architecture

Adaptation layer: only at edge of


ATM adaptation layer
ATM network Provides mapping of different
data segmentation/reassembly type of applications to ATM
roughly analogous to Internet service of the same type
transport layer Segments and Reassembles into
48 byte payload
ATM layer: “network” layer: cell Accepts, Delivers 48 byte
switching, routing payloads to ATM layer
31
Physical layer
ATM and Broadband Access Network Management

ATM layer: Virtual Circuits


VC transport: cells carried on VC from source to dest
call setup, teardown for each call before data can flow
each packet carries VC identifier (not destination ID)
every switch on source-dest path maintain “state” for each
passing connection
link, switch resources (bandwidth, buffers) may be allocated to
VC: to get circuit-like performance
Permanent VCs (PVCs)
long lasting connections

Switched VCs (SVC):


dynamically set up on per-call basis
32
ATM and Broadband Access Network Management

Service vs. protocol


Service – says what a layer does
Ethernet: unreliable subnet unicast/multicast/broadcast datagram service
IP: unreliable end-to-end unicast datagram service
TCP: reliable end-to-end bi-directional byte stream service
Guaranteed bandwidth/latency unicast service

Protocol – says how is the service implemented


a set of rules and formats that govern the communication between two peers
Packet format, how to interpret packet fields
State machine of protocol messages

33

Network management and security Chapter 2


ATM and Broadband Access Network Management
ATM: Network or link layer
Vision: end-to-end transport: “ATM from desktop to desktop”
ATM is a network technology Where is ATM today?
Reality: used to connect IP backbone routers DSL (Digital Subscriber
Loop)
“IP over ATM”
Multi-service switching
ATM as switched link layer, connecting IP routers
Interconnection of IP routers

Private Public Regional Carrier


Private
Computer UNI UNI Public Public
Switch
Switch Public Switch
Private
Private NNI NNI
Computer UNI Private B-ICI
Switch Public
Switch

Digital Public B-ICI


DXI Service UNI Public 34
Computer Router
Unit Switch
Network management and security Chapter 2
ATM and Broadband Access Network Management
Broadband access network management
B2 + D = B-ISDM (Broadband or Basic Integrated Digital Network Management)
Voice, video, and data services
Transport protocol and medium

WAN
ATM Cell-based Technology
SONET / OC-n (n x 51.84 Mbps)
SDH / STS
LAN
ATM LAN Emulation
Access Technology
Cable modem / HFC
DSL
Wireless 35

Network management and security Chapter 2


ATM and Broadband Access Network Management
Broadband access network management
B-ISDN
All purpose digital network
Aims to provide an integrated access that will support a wide variety of
applications in flexible and cost effective manner
Suitable for both business and residential customers
It will provide high speed data links with flexible bit-rate allocation

Conversational (or Interactive) Services


Real time end to end information transfer
Can be bidirectional or Unidirectional.
Telephone, Tele-education, video conferencing etc.
Retrieval Services
Provide users with capability to retrieve information stored elsewhere
36
High Resolution Image Retrieval, Document Retrieval Services.
Distributed Services
ATM and Broadband Access Network Management
Broadband access network management

Synchronous Optical Network: (SONET)


Synchronous Digital Hierarchy (SDH)
Broadband access (service) network

ATM technology based on:


Access to corporate and residence / VP / VC
SOHO Fixed packet size or cell
OC-n used to access institutions Small packet size (53 bytes)
HFC and DSL used for residence Statistical multiplexing
Integrated services 37

Network management and security Chapter 2


ATM and Broadband Access Network Management
Broadband access network management
Types of transfer modes: Different techniques to transfer Data and Voice:
Circuit Switching (Voice Transfer)
Packet Switching (Data Transfer)

Circuit switching
A circuit is established for the duration of the connection
Based on Time Division Multiplexing (TDM)
also called Synchronous Transfer Mode (STM)
Based on recurring structure : Frame
A channel is identified by position of its time slots within the frame
A channel is assigned a fixed number of slots within each frame

Framing Bit Time Slot

Channel 1 Channel 2 Channel n


38
Frame
ATM and Broadband Access Network Management
Broadband access network management
Packet switching
Packet = User Data + Header
Header for Routing, Error and Flow Control

Variable Packet Length


Complex link - to - link protocol
Error and flow control

Store and Forward Switching


Statistical sharing of resources
Variable Length Packets require complex buffer management
schemes
39

Network management and security Chapter 2


ATM and Broadband Access Network Management
Broadband access network management
Virtual circuit concept
Logical Connection
Connection is first established using signaling protocol
Route from the source to the destination is chosen
The same route is used for all cells (fixed size packets) of the connection
No routing decision for every cell
No dedicated path ( unlike Circuit Switching)
Each Link of the network is shared by a set of virtual channels
Each cell uses only virtual channel number

Each packet contains enough information for node (switch) to


forward it towards the destination 40

Network management and security Chapter 2


ATM and Broadband Access Network Management
Broadband access network management
Virtual circuit concept
Signaling protocol establishes
E
C Virtual Circuit
VC4
A B Tables in all nodes are filled
VC5
Parameters used for establishing
D F Virtual Circuits
Calling and Called Party
IN IN V C OUT OUT
Addresses
L IN K L IN K VC
CA 7 AB 4 Traffic Characteristics
QoS Parameters
CA 2 AB 5

DA 3 AB 3

41
Table at Node A
ATM and Broadband Access Network Management
Broadband access network management
Requirements of Virtual Circuit Technology for B-ISDN
Performance Requirements
Support for flexible bandwidth (Variable Access Rate)

Limited Error Rate


Bit Error Rate < 10-7 to 10-10
Packet Loss Rate < 10-5 to 10-7

Limited Delay and Delay Variation (Jitter)


delay < 25 ms for telephony
limited delay for real-time applications
limited delay-variation for voice communication

42

Network management and security Chapter 2


ATM and Broadband Access Network Management
Broadband access network management

ATM: solution for B-ISDN


Suitable for both real-time and non real-time applications
Suitable for both loss-sensitive and loss-insensitive applications
Seamless networking
LAN to MAN to WAN
to carry Voice, Telephony, Multimedia, Data traffic

ATM is based on Virtual Circuit Technology


Virtual Circuits have many advantages over Datagram and Circuit
Switching
Similar to Circuit Switching, ATM uses signaling protocol
43
to
establish Circuit before data communication commences
ATM and Broadband Access Network Management
Broadband access network management
ATM: solution for B-ISDN
Unlike Circuit Switching, ATM is based on Statistical
Multiplexing (Similar to Packet Switching)
In order delivery of Cells due to Virtual circuits
No error protection or flow control on a link by link basis
Links are assumed to be high quality with low bit error rate
Preventive actions: Proper resource allocation and queue dimensioning to
reduce packet loss
End-to-End error protection and recovery.

Flow control by input rate control and capacity reservation


44
ATM and Broadband Access Network Management
Broadband access network management

ATM: solution for B-ISDN


Congestion control : Avoid congestion
Drop cells when congestion occurs

Fixed size packets called Cells


size 53 bytes = 48 bytes payload + 5 bytes header

Reduced header functionality


Provision for multiplexing, head-error detection / correction and limited
control and maintenance function
No sequence number
No destination and source address
5 bytes 48 bytes
Header Payload 45
ATM and Broadband Access Network Management
Broadband access network management

ATM: solution for B-ISDN


Asynchronous Multiplexing of Cells

Packetizer
Digital Pipe
Voice
Cells
Data

Video Multiplexer

46

Network management and security Chapter 2


ATM and Broadband Access Network Management
Broadband access network management

LAN emulation client connection across UNI

ATM workstation communicates with Ethernet workstation using LE services


ATM workstation behaves as an LE client and interfaces via LUNI
Ethernet workstation interfaces via a bridge acting as LEC
LECS, LES, and BUS could be stand-alone devices or part of ATM switch 47
Control connections established before data transfer
ATM and Broadband Access Network Management
Broadband access network management

ATM VLAN configuration

LECS configured to form VLAN groups


Each ATM switch has an interface to ATM ELAN 48
The ELAN backbone and all LANs on it are on VLAN environment
ATM and Broadband Access Network Management
Broadband access network management

ATM WAN reference model

WAN service provided by public service providers


Private networks use public WAN facilities
Management functions (OAM&P): Operations, Administration, Maintenance,
Provisioning
Public and private User Network Interface (UNI) define user interfaces
49

Network management and security Chapter 2


ATM and Broadband Access Network Management
Broadband access network management

ATM WAN Management


Management interface architecture defined by ATM Forum
Public and private NMS responsible to manage respective domains
OSI has defined five management interfaces:
M1 Interface between private NMS and end user
M2 Interface between private NMS and network
M3 Interface between private NMS and public NMS
M4 Interface between public NMS and network
50
M5 Interface between public NMSs
ATM and Broadband Access Network Management
Broadband access network management

SNMP ATM management


ATM Management specifications available for
both SNMP and OSI management
implementations
SNMP agent built in ATM device
System, Interfaces, Interface types, transmission
carrier groups (T1, T3, SONET), and ATM
object groups are monitored
51

Network management and security Chapter 2


Network Management Tools and Applications
Network, associated resources and distributed applications
indispensable

Complex systems

Requires automated network management tools

Need comprehensive data gathering and control tools

SNMP

52

Network management and security Chapter 2


Network Management Tools and Applications
Network management tools
Network
Management
Tools

Network
Operating
Functional Resources / Mechanism Acquisition
Environment
Components

Examples : Examples: Examples: Examples: Free


Alarm Bridge NMS DOS
Manager Ethernet Ping Windows NT Library
Security IP SNMP Sun
Traffic NFS X Unix Sourcelib

53

Network management and security Chapter 2


Network Management Tools and Applications
Network management tools
Status monitoring tools

Name Descriptions
Ifconfig Obtains and configures networking interface parameters
and status
ping Checking the status of node and host
nslookup Looks up DNS for name –IP address transaction
dig Queries DNS server
dhostig Display information on Internet hosts and domains

Ifconfig
Used to assign/read an address to/of an interface
Option -a is to display all interfaces
Notice two interface loop-back (lo0) and Ethernet (hme0) 54

Network management and security Chapter 2


Network Management Tools and Applications
Network management tools: Status monitoring tools
ping
Most basic tool for internet management
Based on ICMP ECHO_REQUEST message
Available on all TCP/IP stacks
Useful for measuring connectivity
Useful for measuring packet loss
Can do auto-discovery of TCP/IP equipped stations on single segment

nslookup
An interactive program for querying Internet Domain Name System servers
Converts a hostname into an IP address and vice versa querying DNS
Useful to identify the subnet a host or node belongs to
55
Lists contents of a domain, displaying DNS record
Network management and security Chapter 2
Network Management Tools and Applications
Network management tools:
traffic monitoring tools
Name Descriptions
ping Used for measuring round-trip packet loss
bing Measuring point – to- point bandwidth of a link
etherfind Inspects Ethernet packets
snoop Captures and inspects network packets
topdump Dumps traffic on a network
getethers Acquires all host addresses of an Ethernet LAN segment
iptrace Measures performance of gateways

56

Network management and security Chapter 2


Network Management Tools and Applications
Network management tools: Packet loss management

netman: ping -s mit.edu


PING mit.edu: 56 data bytes
64 bytes from MIT.MIT.EDU (18.72.0.100): icmp_seq=0. time=42. ms
64 bytes from MIT.MIT.EDU (18.72.0.100): icmp_seq=1. time=41. ms
64 bytes from MIT.MIT.EDU (18.72.0.100): icmp_seq=2. time=41. ms
64 bytes from MIT.MIT.EDU (18.72.0.100): icmp_seq=3. time=40. ms
64 bytes from MIT.MIT.EDU (18.72.0.100): icmp_seq=4. time=40. ms

----mit.edu PING Statistics----


5 packets transmitted, 5 packets received, 0% packet loss
round-trip (ms) min/avg/max = 40/40/42

57

Network management and security Chapter 2


Network Management Tools and Applications
Network management tools: traffic monitoring tools
ping Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list

Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don't Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list. 58
-w timeout Timeout in milliseconds to wait for each reply.
Network management and security Chapter 2
Network Management Tools and Applications
Network management tools: traffic monitoring tools
bing

bing L1 L2

Used to determine throughput of a link


Uses icmp_echo utility
Knowing packet size and delay, calculates bandwidth
bing L1 and L2 and the difference yields the bandwidth of link L1-L2
Bandwidth of link L1-L2 could be higher than the intermediate links.
snoop Puts a network interface in promiscuous mode
Logs data on
Protocol type
Length
Source address
Destination address 59
Reading of user data limited to superuser
Network Management Tools and Applications
Network management tools
Network routing tools
Name Descriptions
netstat Displays the contents of various network-related data
structures
arp Displays and modifies the Internet –to- Ethernet address
rarp transaction tables
traceroute Traces route to a destination with routing delays
tracert

60

Network management and security Chapter 2


Network Management Tools and Applications
Network management tools: Network routing tools
netstat C:\>netstat -n -a
Active Connections
Proto Local Address Foreign Address State
TCP 0.0.0.0:21 0.0.0.0:0 LISTENING
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING
TCP 0.0.0.0:1234 0.0.0.0:0 LISTENING
TCP 0.0.0.0:1235 0.0.0.0:0 LISTENING
TCP 0.0.0.0:1236 0.0.0.0:0 LISTENING
TCP 163.31.153.68:1234 163.22.3.4:80 ESTABLISHED
TCP 163.31.153.68:1235 163.22.4.67:80 ESTABLISHED
TCP 163.31.153.68:1236 163.22.4.67:80 SYN_SENT
UDP 0.0.0.0:135 *:*
UDP 0.0.0.0:445 *:*
UDP 0.0.0.0:38037 *:*
UDP 127.0.0.1:1230 *:* 61
UDP 163.31.153.68:500 *:*
Network Management Tools and Applications
Network management tools: Network routing tools
netstat NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.


-e Displays Ethernet statistics. This may be combined with the -s
option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current 62
configuration information once.
Network Management Tools and Applications
Network management tools: Network routing tools
traceroute/tracert

Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name

Options:
-d Do not resolve addresses to hostnames.
-h maximum_hops Maximum number of hops to search for target.
-j host-list Loose source route along host-list.
-w timeout Wait timeout milliseconds for each reply.

63

Network management and security Chapter 2


Network Management Tools and Applications
Network management tools:
Other commands
SNMP command tools
Network status
Command: snmpnetstat host
MIB Walk community
MIB Browser Useful for finding status of network
snmpsniff connections
% snmpnetstat noc5 public
snmp command tools Active Internet Connections
Proto Recv-Q Send-Q Local Address Foreign Address (state)
snmptest tcp 0 0 *.* *.* CLOSED
tcp 0 0 localhost.46626 localhost.3456 ESTABLISHED
snmpget tcp 0 0 localhost.46626 localhost.3712 ESTABLISHED
tcp 0 0 localhost.46626 localhost.3968 ESTABLISHED
tcp 0 0 localhost.46626 localhost.4224 ESTABLISHED
snmpgetnext tcp 0 0 localhost.3456 localhost.46626 ESTABLISHED
tcp 0 0 localhost.3712 localhost.46626 ESTABLISHED
snmpset tcp 0 0 localhost.3968 localhost.46626 ESTABLISHED
tcp 0 0 localhost.4224 localhost.46626 ESTABLISHED
snmptrap tcp 0 0 noc5.41472 noc5.4480 ESTABLISHED
tcp 0 0 noc5.41472 noc5.4736 ESTABLISHED
64
snmpwalk tcp 0 0 noc5.4480 noc5.41472 ESTABLISHED
tcp 0 0 noc5.4736 noc5.41472 ESTABLISHED
snmpnetstat
Network Management Tools and Applications
Network management tools:
Other commands:
Snmp browser Snmp sniff
Command: snmpwalk host snmpsniff -I interface
community [variable name] A tool in Linux / FreeBSD
environment
Uses Get Next Command
Puts the interface in
Presents MIB Tree promiscuous mode and
captures snmp PDUs.
Similar to tcpdump

Network statistics NM tools


Protocol Analyzers
RMON Probe / Protocol analyzer
MRTG (Multi router traffic grouper)
Home-grown program using tcpdump
65
Network Management Tools and Applications
Elements of a network management system and
applications

66
Network Management Tools and Applications
Network management applications
Effectively manage a specific set of devices
Avoid functionality overlap with the platform
Integrate with a platform through the API and menu system
Reside on multiple platforms
BayNetworks’ Optivity
Cisco’s CiscoWorks
3Com’s Transcend
Perform device inventory
Prioritize the functional areas of network management
Survey network management applications
Choose the network management platform
67

Network management and security Chapter 2


End

Network management and security Chapter 2

You might also like