Unit 5 - Part 4 - Copmuter - Network Sem 6
Unit 5 - Part 4 - Copmuter - Network Sem 6
As many businesses start to realize the importance of delivering reliable, secure wireless access,
they also quickly find out that it's a lot more complex than simply throwing up some access points
and handing out your password.As we know from the Wi-Fi engineering process, you're wireless
network is never done, rather a constant work in progress.
However, managing your Wi-Fi network isn't easy to do, especially if you lack the experience and
certifications required to know what you're doing. Whether you're upgrading an existing wireless
system that's outdated or you're deploying wireless for the first time, there are two important
components that have to be factored into your new WLAN design to maintain performance and
proper security:
A network management system integrates with both your wireless and wired infrastructure,
providing real-time visibility of your entire network.
Access points
Switches
End-users and their devices
Even what your end-users are doing while on the network, from streaming video to surfing
the internet.
A network management system or platform (as it's sometimes called) allows you or a managed
service provider to do this by monitoring how your system and the end-users/devices it's required
to support are actually performing.
In addition to monitoring your network an NMS solution can also help you decrease the time it
takes to troubleshoot wifi problems as well as avoid them all together.
Some network management systems have features that allow you to simulate what your end-users
are experiencing on your current wireless system. This can allow you to stay ahead of potential
problems and even test new additions to your network before they go live.
Benefits for your wired infrastructure
Switching plays a critical role in your ability to deliver reliable wifi access to your guests,
customers and employees.
With the right network management system you'll be able to monitor things such as:
A Network management is all about monitoring your network to manage and maintain wifi
performance on your very much alive, wireless system.
A NAC system can deny network access to noncompliant devices, place them in a quarantined
area, or give them only restricted access to computing resources, thus keeping insecure nodes from
infecting the network.
It defines the type of security algorithm performed on SNMP packets. These are used in only
SNMPv3. There are 3 security levels namely:
1. noAuthNoPriv –
This (no authentication, no privacy) security level uses community string for authentication and no
encryption for privacy.
2. authNopriv – This security level (authentication, no privacy) uses HMAC with Md5 for
authentication and no encryption is used for privacy.
3. authPriv – This security level (authentication, privacy) uses HMAC with Md5 or SHA for
authentication and encryption uses DES-56 algorithm.
SNMP versions –
There are 3 versions of SNMP:
1. SNMPv1 –
It uses community strings for authentication and use UDP only.
2. SNMPv2c –
It uses community strings for authentication. It uses UDP but can be configured to use TCP.
3. SNMPv3 –
It uses Hash based MAC with MD5 or SHA for authentication and DES-56 for privacy. This
version uses TCP. Therefore, conclusion is the higher the version of SNMP, more secure it will be.
SNMP uses UDP
At the transport layer, the protocol used for SNMP message transportation is UDP. This is because
UDP outperforms TCP in lossy networks where congestion is usually very high. One thing to
remember is to fine tune the time-outs of UDP to fetch the best performance in lossy networks.
Also, the implementation of SNMP is kept simple. Simple as in simple network management
protocol. Using TCP makes things far more complex and should be avoided in network
management until and unless absolutely required.
******************************************************************************
The definition of SNMP MIB can be a bit cryptic to newbies. So lets, understand the concept of
SNMP MIBs through a small example here.
Suppose a mobile company server sends a poll question to all the company’s subscribers through
SMS. Being that company’s subscriber, you get that message on your phone and you reply to it.
Simple enough. Now, assume a situation where in a next poll the same company sends MMS this
time. But, this time your phone is not able to comprehend that SMS due to some of its technology
limitations (or any other problem). So, in this case you won’t be able to receive and hence reply to
the MMS.
So we see that the problem above happened because of lack of some MMS capabilities on your
phone. So, in a nutshell your phone was not able to comprehend the incoming message
successfully.
One could assume that same is the case with SNMP manager and an SNMP agent. The network
protocol used between them is of-course SNMP but there has to be a protocol for composing and
comprehending the information being queried. The information being queried could be anything
like the disk usage of the network node that has agent running on it. So the crux is that there should
be a standard structure in which the the query should be formed by the SNMP manager and the
query should be understood by the SNMP agent.
The very basic component of the structure used in case of SNMP is an object. Every information
that can be queried through SNMP is looked in terms of an object. For example, the a system’s up
time is an object known as ‘sysUpTime’. Every object is has an associated ID known as Object ID
or OID which is unique for every object. A group of objects form a MIB.
1. Allows host terminals on a multi-user network to interact with other hosts regardless
of terminal type and characteristics,
2. Allows remote log-on by local area network managers for the purpose of management,
3. Allows users to access information from another host processor for transaction processing,
4. Serves as a backup facility.
PuTTY is an example of a virtual terminal.
ITU-T defines a virtual terminal protocol based on the OSI application layer protocols. However,
the virtual terminal protocol is not widely used on the Internet.