Network Management
Network Management
Network management is defined as the process of managing a network for fault and performance
using various tools and technologies to keep up with the business requirements. The objective of
network management is to achieve an error free network. In today's environment, multiple network
management tools are employed making the whole process a complex one. It requires automated
network management tools and also a comprehensive data gathering and control tools
SNMP-Simple Network Management Protocol (SNMP) is a popular protocol for network
management. It is used for collecting information from, and configuring, network devices, such as
servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network
ELEMENTS OF NETWORK MANAGEMNET
Includes the following:
Fault
Accounting
Configuration
Performance
Security
1. Fault Management
Fault Management detects, fixes, logs, and reports network/system problems. Fault management
involves determining symptoms through measurements and monitoring, and isolating the problem.
When fault occurs
Determine where
Isolate rest of network so it can continue to function
Reconfigure or modify network to minimize impact of operation without failed
components
Repair or replace failed components
As a user requirement, it is a fast and reliable problem resolution and need immediate notification.
The impact and duration is minimized by redundant components and routes, this is achieved
through fault tolerance (tolerance-is the property that enables a system to continue operating
properly in the event of the failure of (or one or more faults within) some of its components). The
fault management capability should be redundant. After correction, fault management must ensure
problem is truly resolved and no new problems introduced i.e. problem tracking and control and
also there is minimal effect on network performance
2. Accounting Management
Accounting Management which keeps track of usage per account, billing, and ensures resources
are available according to the account requirements.
The individual cost centers or projects are charged for use of network services. Network manager
needs to be able to track use of network
User or group may be abusing access
Users may be making inefficient use of network
Need to plan for network growth
As a user requirement there is a need to specify sort of accounting information recorded at various
nodes
Interval between successive sendings of information
Algorithms used in calculating charges
Accounting reports under network manager control
Also, verifying users' authorization to access and manipulate accounting information
3. Configuration Management
This deals with the set of functions associated with managing orderly changes in a network. The
basic function of managing the equipment in the network belongs to this category. This includes
tracking the equipment in the network and managing the addition/removal of equipment,
including any rerouting of traffic this may involve and the management of software versions on
the equipment.
The network needs to convert external client signals entering the optical layer into appropriate
signals inside the optical layer. This function is adaptation management.
It also involves maintaining an inventory of the network and system configuration information.
This information is used to assure inter-operability and problem detection. Examples of
configuration information include device/system OS name and version, types and capacity of
interfaces, types and version of the protocol stacks, type and version of network/system
management SW, etc.
4. Performance Management
This deals with monitoring and managing the various parameters that measure the performance
of the network. Performance management is an essential function that enables a service provider
to provide quality-of-service guarantees to their clients and to ensure that clients comply with the
requirements imposed by the service provider. It is also needed to provide input to other network
management functions, in particular, fault management, when anomalous conditions are detected
in the network.
Monitoring involves the following:
Tracks activities
What is the level of capacity utilization?
Is there excessive traffic?
Has throughput been reduced to unacceptable levels?
Are there bottlenecks?
Is response time increasing?
As a user requirement, the performance management must be known in sufficient details to assess
user queries. Because for instance application needs consistent good response time. Performance
statics help planning management and maintenance which recognize bottlenecks before the cause
problems. It also involves capacity planning which is based on performance information.
5. Security Management
It includes administrative functions such as authenticating users and setting attributes such as read
and write permissions on a per-user basis. From a security perspective, the network is usually
partitioned into domains, both horizontally and vertically. Vertical partitioning implies that some
users may be allowed to access only certain network elements and not other network elements.
For example, a local craftsperson may be allowed to access only the network elements he
is responsible for and no other network elements.
o Horizontal partitioning implies that some users may be allowed to access some
parameters associated with all the network elements across the network.
For example, a user leasing a lightpath may be provided access to all the performance
parameters associated with that lightpath across all the nodes that the light path traverses.
Security also involves protecting data belonging to network users from being tapped or
corrupted by unauthorized entities. This part of the problem needs to be handled by
encrypting the data before transmission and providing the decrypting capability to
legitimate users.
The key benefit to NMS is that it permits users to monitor or manage their entire business operations using
a central computer.
A network management system is useful in:
Network device discovery - identifying what devices are present on a network.
Network device monitoring - monitoring at the device level to determine the health of
network components and the extent to which their performance matches capacity plans
and intra-enterprise service-level agreements (SLAs).
Network performance analysis - tracking performance indicators such
as bandwidth utilization, packet loss, latency, availability and uptime
of routers, switches and other Simple Network Management Protocol (SNMP) -enabled
devices.
Intelligent notifications - configurable alerts that will respond to specific network
scenarios by paging, emailing, calling or texting a network administrator.
Quality network management systems include the following features:
Saves money: Only one system admin is required at a single location to monitor and
manage the entire network, which cuts hiring expenditures.
Saves time: Each IT provider gets direct access to any data when required. All team
members can simply enter or retrieve data using their own workstations. At the same
time, their access may be controlled by the network manager.
Increases productivity: Helps manage every aspect of the office network, which includes
software, hardware and other peripherals. The NMS identifies an issue as soon as it
occurs it to ensure that there is no productivity slowdown or data loss.
i) Management Station
It’s a standalone system or part of shared system with Interface for human network manager. It
has a Set of management applications which involve Data analysis and Fault recovery. The
Interface monitors and control network
The management station translate manager’s requirements into monitoring and control of remote
elements. It also have a database of network management information extracted from managed
entities
The Management workstation gathers information about the network elements in its domain. It
may do this either by polling them, or by having the network element “interrupt” it – which is
known as a trap.
It also contains a user interface which allows a network administrator to configure and view the
status of network elements, and an alarm system to notify people in the event of network faults.
ii) Management Agent
The management agent can be an Hosts, bridges, hubs, routers equipped with agent softwarewhich a
allows them to be managed from management station. It Respond to requests for information and also
Respond to requests for action
SNMP v2
Framework on which network management applications can be built
e.g fault management, performance monitoring, accounting
Protocol used to exchange management information
Each player maintains local MIB
Structure defined in standard
At least one system responsible for management
Houses management applications
Support central or distributed management
In distributes system, some elements operate as manager and agent
Exchanges use SNMP v2 protocol
Simple request/response protocol
Typically uses UDP
— Ongoing reliable connection not required
— Reduces management overhead
SNMP v3
— Addresses security issues of SNMP v1/2
— Proposed standard January 1998
— Defines overall architecture and security capability
— To be used with SNMP v2
Provide the following services
Authentication
Part of User-Based Security (UBS)
Assures that message:
— Came from identified source
— Has not been altered
— Has not been delayed or replayed
Privacy
— Encrypted messages using DES(Data Encryption Standard)- a symmetric-
key algorithm for the encryption of electronic data
Access control
— Can configure agents to provide a number of levels of access to MIB
— Access to information
— Limit operations