Chapter Two
Chapter Two
Management
Network Management
• Network management involves the planning,
organizing, monitoring, accounting, and controlling
of activities and resources and to keep the
network service available and correct.
• Network management is the activities, methods,
procedures, and tools that pertain to the operation
includes monitoring the network to spot problems
as soon as possible, administration( keeping track
of resources in the network and how they are
assigned), maintenance(concerned with
performing repairs and upgrades), and configuring
resources in the network to support a given
service of networked systems.
• Three areas of network need managing. They
are :.
– network management as management of the
network comprising nodes and links,
– system management as managing system resources,
such as central processor usage, disk usage, and
application processes.
– Service management deals with services provided by
organizations to customers.
Basic Components of Network
Management System
• Network management has three main
components:
– a managing center consists of the network
administrator and his or her facilities.
– a managed device, the network equipment, including
its software, that is controlled by the managing center.
Any hub, bridge, router, server, printer, or modem can
be a managed device.
– A network management protocol(SNMP, CMIP). a
policy between the managing center and the
managed devices. The protocol in this context allows
the managing center to obtain the status of managed
devices.
• Network management system contains two
primary elements:
– Manager is the console( )وحده التحكمthrough which the
network administrator performs network
management functions. A manager can be a network
administrative device, as a management host.
– Agents are the entities that interface ()وسيطto the
actual device being managed.
• An agent can use the network management protocol(SNMP,
CMIP) to inform the managing center of an unexpected
event.
• Bridges, hubs, routers or network servers are
examples of managed devices that contain
managed objects.
• These managed objects might be hardware,
configuration parameters, performance statistics,
and so on, that directly relate to the current
operation of the device in question.
• MIB is (management information base) is known as
a virtual information database where the objects
are arranged.
• Network management protocols (such as SNMP,
CMIP) allow managers and agents to communicate
for the purpose of accessing these objects.
A typical distributed management system
comprises:
• Network elements(managed devices ):
– Equipments which communicate with the network
with the purpose of being monitored or controlled, are
named network elements.
– Network elements are hardware devices such as
computers, routers, and terminal servers that are
connected to networks.
– A network element is a network node that contains an
SNMP agent, which resides on a managed network.
Manager:
– A manager generates commands and receives
notifications from agents.
– There are usually only a few managers in a system.
Agents:
– Agents collect and store management information
such as the number of error packets received by a
network element.
– An agent has local knowledge of management
information and transforms that information into the
form compatible with SNMP.
– An agent responds to commands from the manager
and sends notification to the manager.
– There are potentially many agents in a system.
• Managed object:
– A managed object is a vision of a feature of a network,
physical and logical resources, such as signaling
terminals, routes, event logs, alarm reports and
subscriber data, are regarded as managed objects.
– Managed objects differ from variables, which are
particular object instances.
– Managed objects can be scalar (defining a single
object instance) or tabular (defining multiple and
related instances).
Network Management Stations (NMSs):
– Sometimes NMSs are called consoles.
– These devices execute management applications that
monitor and control network elements.
– Physically, NMSs are usually engineering workstation-
caliber computers with fast CPUs, mega pixel color
displays, substantial memory, and abundant disk space.
– At least one NMS must be present in each managed
environment.
• Management protocol:
– A management protocol is used to convey نقل
management information between agents and network
management stations (NMSs).
– Simple Network Management Protocol (SNMP) is the
Internet community’s de facto standard management
protocol. The OSI management protocol standard is
Common Management Information Protocol (CMIP).
• Structure of Management Information (SMI)
– The structure of management information (SMI) language
is used to define the rules for naming objects and to
encode objects in a managed network center.
– SMI is a language by which a specific instance of the data
in a managed network center is defined.(ASN.1 (Abstract
Syntax Notation One)language)
• Management Information Base (MIB)
– A management information base (MIB) stems from the
OSI/ISO Network management model and is a type of
database used to manage the devices in a communications
network.
– It comprises a collection of objects in a (virtual) database
used to manage entities (such as routers and switches) in a
network.
– Objects in the MIB are defined using a subset of Abstract
Syntax Notation One (ASN.1)
• Proxy: Management proxies are entities that
provide management information on behalf
of( )نيابة عنother entities.
Example:
• SNMP network management systems (NMSs)
can manage even non-TCP/IP network elements
through proxy agents.
• The proxy agent monitors a non-SNMP
community with non-SNMP agents and then
converts objects and data to SNMP compatible
objects and data to feed to an SNMP manager.
Network Management Models
Network
Mangement
MDB Manager
Managed objects
Managed objects
MDB Management Database
Agent process
Agent Agent
Agent NMS MDB Agent NMS MDB
M anager M anager
Managed objects
Managed objects
Agent NMS
Agent proces s
Agent process
Managed objects
• The manager has both the management database
(MDB) and the MIB.
• The MDB is a real database and contains the
measured or administratively configured value of
the elements of the network.
• The MIB is a virtual database and contains the
information necessary for processes to exchange
information among themselves.
• EX.: The new hub is another instance of the hub
with a new IP address, and its MlB information is
already in the manager's MIB. Its address and the
number of ports associated with it are added to
MDB by the manager querying the agent.
• The MIB that contains data on managed objects need
not be limited to just physical elements. For example,
in network management, management information
extends information beyond that associated with the
description of network elements or objects.
• Some examples of information that can be stored in
the MIB:
– Network Elements: hubs, bridges, routers, transmission
facilities, etc.
– Software Processes: programs, algorithms, protocol
functions, databases, etc.
– Administrative Information: contact person, account.
number, etc.
• In fact, any type of information could be included as
an object in the MIB.
Management information Tree(MIT)
• The managed objects are uniquely defined by a tree
structure specified by the OSI model and are used
in the Internet model.
• Each managed object occupies a node in the tree.
• The root node does not have an explicit
designation.
• The root has three nodes in the layer behind it (iso),
(itu), and (iso-itu).
• The number in each circle identifies the designation
of the object in each layer.
• All internet-managed objects will be that
number(1.3.6.1) followed by more dots and
numbers.
iso International Standards Organization
itu International Telecommunications Union
dod Department of Defense
Designation:
iso 1
org 1.3
itu iso iso-itu
dod 1.3.6 0 1 2
internet 1.3.6.1
org
3
dod
6
internet
1
Status:
Im plem entaion
requirem ents
Syntax : Defintion :
m odel of object Sem antics -
textual des cription
Object Class:
Elliptical
Object Class:
object
Circular
object Behaviour
Operations:
Push
Attributes: Attributes:
circle, dimension ellipse, dimension
first "John",
middle "I",
last "Smith"
}
• Here person_name, beginning with lowercase
letters, is the name of the data type(object
name).
Notes
• ENUMERATED is a special case of INTEGER
• Example: RainbowColors(5) is orange
Object Identifier
itu
0
iso
1
iso-itu
2 • In a MIB there is an identifier for each
org
occurrence of an object.
3
internet OBJECT IDENTIFIER ::=
dod
6 {ISO(1) ORG(3) DOD(6) INTERNET(1)}
internet
1
private
4
enterprise
1
IBM
Private type identifier for IBM
2
1.3.6.1.4.1.2
TLV Encoding
• Basic Encoding Rules (BER): the algorithm to convert the
textual ASN.1 syntax to machine-readable code. Ex. TLV.
• In ASN.1 text data is encoded into a bit-oriented data
representation called TLV (Type, Length, and Value).
• TLV type, length, and value are components of the
structure.
• The value of P/C is 0 for Primitive and 1 for
Construct. The lowest 5 bits (1- 5) designate
the tag value in binary.
• For example, INTEGER to a universal class with
a tag value of 2 and is a primitive data type.
• Hence, the type is 00000010.