NMT All
NMT All
Management
by
Nikhil Tiwrai
Telephone network
Characteristics
Reliable - does what is expected of it
Dependable - always there when you need it
Good quality (connection) - hearing each other well
Reasons
Good planning, design, and implementation
Good operation and management of network
Telephone Network Model
To other
Regional centers
Sectional centers
Regional Center Regional Center Primary centers
Class 1 switch Class 1 switch Toll centers
End offices
To other
Sectional Center Sectional Center Primary centers
Class 2 switch Class 2 switch Toll centers
End offices
Addressing Addressing
Telephone MAC, IP, Port, Domain Name,
number URL
Intelligent
Networks
Network Configuration Network Configuration
fixed, or Changed frequently
seldom changed
Growth Growth
Stable, not grow in dog years, new
changed applications
Network Management Network Management
Well planned Network Management
NOCs Tools/Systems
Workstation
Mail Server
(Joe)
Workstation
Bridge / Bridge /
Router Router
Domain
Name Bridge /
Server Router
LAN C
Gateway
WAN
Gateway
LAN X
Bridge /
Router
Bridge /
Bridge / Router
Router
LAN Y LAN Z
Workstation
Users
TT Restoration
New Performance & Traffic Data
Technology
Fault TT
Installation
FCAPS
Fault Management
Manages network problems to keep the network
running reliably and efficiently.
Fault management process involves the following
steps
Detecting the problem symptoms.
Isolating the problem.
Fixing the problem automatically (if possible) or manually.
Logging the detection and resolution of the problem.
Configuration Management
Configuration Management monitors network and
system configuration information and stores it in a
configuration management database.
The maintenance of this database allows network
administrators to track hardware, software, and
other network resources
Configuration Management
(2)
Each network device has a variety of information
associated with it:
Software version information for the operating system,
protocol software, or management software.
Hardware version information for the interfaces or hardware
controllers.
Contact information indicating who to contact if problems with
the device arise.
Location information indicating the physical location of the
device.
Accounting Management
Measures network utilization parameters in order
to regulate individual and group uses of the
network.
Minimizes network problems and maximizes
fairness of user access to the network because
network resources can be portioned based on
network capacity and user needs.
Performance Management
Maintains internetwork performance at acceptable levels by
measuring and managing various network performance
variables.
Performance variables include network throughput, user
response times, line utilization, and others.
Performance management involves three basic steps:
1. Gathering data relating to key performance variables.
2. Analyzing data to determine the normal (baseline)
performance levels.
3. Determining appropriate performance thresholds for each
variable so that exceeding these thresholds indicates a
network problem worthy of attention.
Performance Management
(2)
Reactive
when performance becomes unacceptable (that is,
a user-defined threshold is exceeded), the
managed device reacts by sending an alert to the
network management system (NMS).
Proactive
simulation is used to project how network growth
will affect performance metrics. These simulations
alert administrators to impending problems before
they affect network users.
Performance Management
(3)
Reactive PM Components
The management entity continually monitors performance
variables in managed devices.
When a particular performance threshold is exceeded,
the NMS or the managed device detects the problem.
If the managed device detects the problem, it generates
an alert and sends it to the NMS.
The NMS takes an appropriate action, such as alerting
the network administrator.
Security Management
Access control
Controls access to network resources, and prevents network
sabotage (intentional or unintentional) and unauthorized access to
sensitive information.
Aids administrators in creating a secure network environment. This
includes:
partitioning network resources into authorized and unauthorized areas,
mapping groups of users to those areas, and
monitoring, policing, and logging user access to resources in those
areas.
Security monitoring
Security event collection
Event analysis, correlation and alert generation
Alert handling
Network Management
Systems
A network management system (NMS) is a collection of
tools for network monitoring and control
based on the manager-agent paradigm
the manager sends mgmt requests to one or more agents
an agent performs the requested operation and returns results
when agents detect faults and they report to the manager
NMS typically provides a GUI through which most or all
management tasks can be performed
Many commercial and freely available NMSs exist:
Commercial
HP OpenView, IBM NetView, Sun Net Manager, Cisco works and etc.
Open source
OpenNMS , Nagios and etc.
Network Maintenance
Application
Services
Objects Objects
Management
Vendor A Vendor B
Protocol
Objects Objects
Transport
Protocols
Notes
n Message exchange between NMSs managing different domains
Standard Management
Frameworks
Internet Network Management Framework (IETF)
SNMPv1
SNMPv2
SNMPv3
OSI Network Management Framework (ISO/ITU-T)
CMIP (X.700 Series)
Future trends:
Object-oriented approach
Service and policy management
Web-based management
XML-base management
Challenges of IT Manager
nManagement of Information
nAuthentication and authorization issue
nFinancial Investment
nRapid advance of technology
nProblem analysis
nAnticipate customers demands
nAcquire and retain human resource
nManage client server environment in converged network
nMaintain reliability without disrupting the network and
impacting business
Case histories on Network
In the following histories we see that without the use of
proper network management tool could present a challenge
to IT managers
Case History I :- Importance of topology
Case History II :- Centrally Managed network Issues
Case History III :-Transaction delays in client server
network
Case History IV :-Service impact in end to end services of
customers
Case History V :-Some Common Network problem.
Thank
You
Chapter :- 1
Cable Central
Modem Office
Head End Equipment
SDH / SONET
WAN
Router/
ATM Switch Satellite Communication
and/or Telephone Loop
Wireless
OC-n / Wireless
Business Router/ Customer
STS-n & Telephone
Customers ATM Switch Network
Link Loop
Notes
• Three categories of customer base:
• Corporate or enterprise
• Service providers
• Residence or SOHO
Broadband Access Networks
Cable Modem DSL
Customer Cable HFC Telephone xDSL Customer
Network Modem Network Loop Modem Network
Cable Central
Modem Office
Head End Equipment
SDH / SONET
WAN
Router/
ATM Switch Satellite Communication
and/or Telephone Loop
Wireless
OC-n / Wireless
Business Router/ Customer
STS-n & Telephone
Customers ATM Switch Network
Link Loop
Notes
• Five types of access networks
• OC-n / STS-n link
• Gateway to service providers (not shown)
• HFC / Cable modem
• DSL
• Wireless
• Fixed wireless
• Satellite communication
Access Technologies
Broadband
Access
Technology
HFC Satellite
xDSL Wireless
Communication
One- Two-
Way Way
Notes
Access Technologies
Broadband
Access
Technology
HFC Satellite
xDSL Wireless
Communication
One- Two-
Way Way
Notes
• Hybrid fiber coaxial technology plant / cable modem
at customer premises
• Telephony return is one-way, downstream
(forward direction) cable, upstream (reverse
direction) telephone
• Two-way downstream at high frequency band
and upstream at low frequency band
• Carries voice, video and data
• Upstream bandwidth requirements less compared
to downstream bandwidth
Access Technologies
Broadband
Access
Technology
HFC Satellite
xDSL Wireless
Communication
One- Two-
Way Way
Notes
• xDSL: Digital subscriber line technology
• Asymmetric DSL (ADSL)
• High-speed DSL (HDSL)
• Very-high speed DSL (VDSL)
• Uses existing local loop telephone facilities
Access Technologies
Broadband
Access
Technology
HFC Satellite
xDSL Wireless
Communication
One- Two-
Way Way
Notes
• Wireless: Terrestrial fixed wireless systems
• Instructional scientific and medical (ISM):
902 - 928 MHz (0.5 mile) and
2400 - 2483 MHz (15 miles)
• Multichannel multipoint distribution service
(MMDS) 2500 - 2686 MHz (35 miles)
• Local multipoint distribution service
27,500 - 28,350 MHz and 31,000 - 31,300 MHz
(3 miles)
Access Technologies
Broadband
Access
Technology
HFC Satellite
xDSL Wireless
Communication
One- Two-
Way Way
Notes
• Satellite communication
• Telephony return is one-way, downstream
wireless, upstream telephone
• Two-way downstream and upstream wireless
HFC Network Ethernet
Cable
Modem
NIU
Satellite
2-WAY
Head Fiber COAX
WAN Fiber
End Node
Amplifier
ISP NIU
Cable
Modem
NIU Network Interface Unit
TV Monitor
Workstation
Notes
• Fiber - 2 one-way transmission
• Coaxial - 2-way transmission
• 2-way amplifiers
• Fiber node: optical - RF conversion
HFC Network Ethernet
Cable
Modem
NIU
Satellite
2-WAY
Head Fiber COAX
WAN Fiber
End Node
Amplifier
ISP NIU
Cable
Modem
NIU Network Interface Unit
TV Monitor
Workstation
Notes
• Head end:
• Signals from multiple sources multiplexed
• Frequency conversion for local signal
• Network interface device (NID) / unit (NIU)
Demarcation point between customer network and
service provider networks
• Cable modem: RF Ethernet, analog telephony,
and video
Thank You
Abstract Syntax Notation One
N.1 is more than a syntax; it’s a language
dresses both syntax and semantics
o type of syntax
Abstract syntax: set of rules that specify
data type and structure for information storage
Transfer syntax: set of rules for communicating
information between systems
kes application layer protocols
ependent of lower layer protocols
n generate machine-readable code: Basic
coding Rules (BER) is used in management
dules
Backus-Nauer Form (BNF)
Definition:
<name> ::= <definition>
Rules:
<digit> ::= 0|1|2|3|4|5|6|7|8|9
<number> ::= <number> | <digit> <number>
<op> ::= +|-|x|/
<SAE> ::= <number>|<SAE>|
<SAE><op><SAE>
Example:
• •9BNF is used for
is primitive 9 ASN.1 constructs
• •19
Constructs developed
is construct of 1 andfrom
9 primitives
• The above example illustrates how numbers
are constructed from the primitive <digit>
• Simple Arithmetic Expression entity (<SAE>)
is constructed from the primitives <digit> and
<op>
Simple Arithmetic Expression
E> ::= <number> | <SAE><op><number>
mple: 26 = 13 x 2
Notes
Type and Value
Assignments
• <BooleanType> ::= BOOLEAN
• <BooleanValue> ::= TRUE | FALSE
Notes
odule name starts with capital letters
ata types:
Primitives: NULL, GraphicString
Constructs
• Alternatives : CHOICE
• List maker: SET, SEQUENCE
• Repetition: SET OF, SEQUENCE OF:
fference between SET and SEQUENCE
Data Type: Example 2
Trade-message ::= SEQUENCE
{invoice-no INTEGER
name GraphicString,
details SEQUENCE OF
SEQUENCE
{part-no INTEGER
quantity INTEGER},
charge REAL,
authenticator Security-Type}
Notes
QUENCE OF SEQUENCE makes tables of rows
ASN.1 Symbols
Symbol Meaning
::= Defined as
| or, alternative, options of a list
- Signed number
-- Following the symbol are comments
{} Start and end of a list
[] Start and end of a tag
() Start and end of subtype
.. Range
Chapter 3
Keyword Examples
• CHOICE
• SET
• SEQUENCE
• OF
• NULL
Tag
Structure
Number
Context-
Universal Application Private
specific
Notes
tructure defines how data type is built
ag uniquely identifies the data type
Chapter 3
Structure
• Simple
• PageNumber ::= INTEGER
• ChapterNumber ::= INTEGER
• Structure / Construct
• BookPageNumber ::=
SEQUENCE
{ChapterNumber, Separator,
PageNumber
Example: {1-1, 2-3, 3-39}
• Tagged
• Derived from another type; given a new ID
• In Fig. 3-14, INTEGER is either universal or
application specific
• Other types:
• CHOICE, ANY
Structure
Tag
• Tag uniquely identifies a data type
• Comprises class and tag number
• Class:
• Universal - always true
• Application - only in the application used
• Context-specific - specific context in application
• Private - used extensively by commercial
vendors
Notes
ple:
OLEAN Universal 1
EGER Universal 2
earch Application [1] (Figure 3.13)
duct-based Context-specific under research [0]
Chapter 3
Enumerated Integer
RainbowColors ::= ENUMERATED
{
violet (0)
indigo (1)
blue (2)
green (3)
yellow (4)
orange (5)
red (6)
}
Notes
NUMERATED is a special case of INTEGER
xample: RainbowColors(5) is orange
Chapter 3
Object Name
org
3
dod
6
internet
1
private
4
enterprise
1
IBM
2
Notes
ternet OBJECT IDENTIFIER ::=
{ISO(1) ORG(3) DOD(6) INTERNET(1)}
Chapter 3
TLV Encoding
Type Length Value
Notes
LV Type, length, and value are components
of the structure
Chapter 3
Macro
<macroname> MACRO ::=
BEGIN
TYPE NOTATION ::= <syntaxOfNewType>
VALUE NOTATION ::= <syntaxOfNewValue>
<auxiliaryAssignments>
END
Example:
CS8803 OBJECT-IDENTITY
STATUS current
DESCRIPTION "A graduate-level network
management course offered every fall by
College of Computing in Georgia Institute of
Technology."
::= {csclasses 50}
Notes
Macro is used to create new data types
Chapter 3
Chapter 3
Basic Foundations:
Standards, Models, and Language
Chapter 3
Notes
• Organization
• Network management components
• Functions of components
• Relationships
• Information
• Structure of management information (SMI)
• Syntax and semantics
• Management information base (MIB)
• Organization of management information
• Object-oriented
Chapter 3
Notes
• Communication
• Transfer syntax with bi-directional messages
• Transfer structure (PDU)
• Functions
• Application functions
• Configure components
• Monitor components
• Measure performance
• Secure information
• Usage accounting
Chapter 3
Notes
• Organization
• Same as OSI model
• Information
• Same as OSI, but scalar
•Communication
• Messages less complex than OSI
and unidirectional
• Transfer structure (PDU)
• Functions
• Application functions
• Operations
• Administration
• Security
Chapter 3
TMN Architecture
• Addresses management of
telecommunication
networks
• Based on OSI model
• Superstructure on OSI network
• Addresses network, service, and business
management
Notes
Chapter 3
Organizational Model
• Manager
• Sends requests to agents
• Monitors alarms
• Houses applications
• Provides user interface
• Agent
• Gathers information from objects
• Configures parameters of objects
• Responds to managers’ requests
• Generates alarms and sends them to
mangers
• Managed object
• Network element that is managed
• Houses management agent
• All objects are not managed / manageable
Notes
Chapter 3
Two-Tier Model
MDB Manager
Managed objects
Unmanaged objects
Notes
• Agent built into network element
Example: Managed hub, managed router
• An agent can manage multiple elements
Example: Switched hub, ATM switch
• MDB is a physical database
• Unmanaged objects are network elements
that are not managed - both physical (unmanaged
hub) and logical (passive elements)
Chapter 3
Three-Tier Model
MDB Manager
Managed objects
MDB Management Database
Agent process
Notes
• Middle layer plays the dual role
• Agent to the top-level manager
• Manager to the managed objects
• Example of middle level: Remote monitoring
agent (RMON)
Chapter 3
Manager of Managers
MoM MDB
Agent Agent
Agent NMS MDB Agent NMS MDB
Manager Manager
Managed objects
Managed objects
Agent NMS
Agent process
Notes
• Agent NMS manages the domain
• MoM presents integrated view of domains
• Domain may be geographical, administrative,
vendor-specific products, etc.
Chapter 3
Peer NMSs
Notes
• Dual role of both NMSs
• Network management system acts as peers
• Dumbbell architecture discussed in Chapter 1
• Notice that the manager and agent functions are
processes and not systems
Chapter 3
Information Model:
Analogy
• Figure in a book uniquely identified by
• ISBN, Chapter, and Figure number in that
hierarchical order
• ID: {ISBN, chapter, figure}
• The three elements above define the syntax
• Semantics is the meaning of the three
entities according to Webster’s dictionary
• The information comprises syntax and semantics
about an object
Notes
Chapter 3
Notes
Chapter 3
Notes
Chapter 3
Notes
Chapter 3
Notes
Chapter 3
Agent process
Managed objects
Notes
• Distinction between MDB and MIB
• MDB physical database; e.g.. Oracle, Sybase
• MIB virtual database; schema compiled into
management software
• An NMS can automatically discover a managed
object, such as a hub, when added to the network
• The NMS can identify the new object as hub only
after the MIB schema of the hub is compiled into
NMS software
Chapter 3
Managed Object
• Managed objects can be
• Network elements (hardware, system)
• hubs, bridges, routers, transmission facilities
• Software (non-physical)
• programs, algorithms
• Administrative information
• contact person, name of group of objects
(IP group)
Notes
Chapter 3
Root
Level 1
Level 2
Level 3
Notes
Chapter 3
org
3
dod
6
internet
1
Notes
• iso International Standards Organization
itu International Telecommunications Union
dod Department of Defense
• Designation:
• iso 1
• org 1.3
• dod 1.3.6
• internet 1.3.6.1
Chapter 3
Notes
• Example of a circle
• “circle” is syntax
• Semantics is definition from dictionary”
“A plane figure bounded by a single curved
line, every point of which is of equal distance
from the center of the figure.”
• Analogy of nursery school
Chapter 3
Managed Object:
Internet Perspective
Status :
Implementaion
requirements
Syntax : Defintion :
model of object Semantics -
textual description
Notes
·object ID unique ID
·and descriptor and name for the object
·syntax used to model the object
·access access privilege to a
managed object
·status implementation
requirements
·definition textual description of the
semantics of object
type
Chapter 3
Managed Object:
OSI Perspective
Notifications :
Notify changes in
attribute values
Object Class:
Object Class:
Elliptical
Circular
object
object Behaviour
Operations:
Push
Attributes : Attributes:
circle, dimension ellipse, dimension
Notes
·object class managed object
·attributes attributes visible at its boundary
·operations operations which may be applied to it
·behaviour behaviour exhibited by it in response to operation
·notifications notifications emitted by the object
Chapter 3
Characteristics Example
Object type PktCounter
Syntax Counter
Access Read-only
Status Mandatory
Description Counts number of packets
Figure 3.10(a) Internet Perspective
Characteristics Example
Object class Packet Counter
Attributes Single-valued
Operations get, set
Behavior Retrieves or resets values
Notifications Generates notifications on new
value
Figure 3.10 (b) OSI Perspective
Notes
Chapter 3
Notes
Chapter 3
Operations /
Requests
Notes
• In Internet requests/responses, in OSI operations
• In Internet traps and notifications (SNMPv2),
in OSI notifications
Chapter 3
Transfer
Manager
Protocols
Operations / Requests / Responses Agent
Applications Traps / Notifications Applications
Manager Agent
SNMP (Internet)
Communication Communication
CMIP (OSI)
Module Module
UDP / IP (Internet)
Transport Layers Transport Layers
OSI Lower Layer Profiles (OSI)
Physical Medium
Notes
• Internet is based on SNMP; OSI is based on CMIP
• OSI uses CMISE (Common Management Information
Service Element) application with CMIP
• OSI specifies both c-o and connectionless transport
protocol; SNMPv2 extended to c-o, but rarely used
Chapter 3
Functional Model
OSI
Functional Model
Notes
• Configuration management
• set and change network configuration and
component parameters
• Set up alarm thresholds
• Fault management
• Detection and isolation of failures in network
• Trouble ticket administration
• Performance management
• Monitor performance of network
• Security management
• Authentication
• Authorization
• Encryption
• Accounting management
• Functional accounting of network usage
SNM
P
INTRODUCTION
SNMP
What is SNMP?
SNMP Architecture
SNMP Components
Versions of SNMP
Trap Event
WHAT IS SNMP?
Simple Network Management Protocol (SNMP) is an
Internet standard protocol
It is defined by IETF, Internet engineering task force. It is
application layer protocol.
It manages devices on IP networks. Devices that
typically support SNMP include routers, switches,
servers, workstations, printers, modem racks and more.
It is used mostly in network management.
SNMP is an application program that allows,
manager to retrieve value of an object defined in
agent, a manager to store value in an object defined
in agent , an agent to send alarm information called
trap event.
SNMP MODEL
•Organization Model
• Relationship between network element,
agent, and manager
• Hierarchical architecture
• Information Model
• Uses ASN.1 syntax
• SMI (Structure of Management Information
• MIB ( Management Information Base)
• Communication Model
• Transfer syntax
• SNMP over TCP/IP
• Communication services addressed by
messages
• Security framework community-based model
Two-Tier Organization Model
Network Network
Element Element
(a) One Manager - One Agent Model (b) Multiple Managers - One Agent Model
Three-Tier Organization Model:
RMON
SNMP
Manager
RMON
Probe
Managed
Objects
Three-Tier Organization Model:
Proxy Server
SNMP
Manager
Proxy
Server
Non-SNMP SNMP
Managed Managed
Objects Objects
SNMP ARCHITECTURE
SNMP defines manager ,it monitoring
and managing devices connected with
network.
Manager sending request to network
GetNext-Request
Get-Response
Get-Request
Get-Request
Set-Request
Set-Request
Get-Response
Trap
Trap
SNMP SNMP
UDP UDP
IP IP
DLC DLC
PHY PHY
Physical Medium
workstations
routers
switches
printers
…many more.
SNMP Functionality?
Fault Management.
Configuration Management.
Security Management.
SNMP Components
SNMP Manager.
SNMP Agent.
MIB- Management Information Base.
Network
SNMP SNMP
Manag Request Agen
er t
Response
Proces Proce
Trap
s MIB ss MIB
SNMP Manager
Small piece of code that runs on every SNMP managed device and
gathers and sends data about that managed resource in response to
a request from the manager.
1.3.6.1.4.1.9
MIB Syntax
sysContact OBJECT-TYPE -- OBJECT-TYPE is a macro
SYNTA DisplayString (SIZE (0..255))
X read-write -- or read-write, write-only, not-accessible
ACCESS mandatory -- or optional, deprecated, obsolete
STATUS
DESCRIPTION
“Chris Francois
[email protected]
g
(360)650-0000”
::= { system 4 }
MIB example: UDP module
Object ID…....Name……………………Type…………………
Comments……………………………………….
1.3.6.1.2.1.7.5 UDPOutDatagramsSEQUENCE
1.3.6.1.2.1.7.4 Counter32 one entry for each
# datagrams sent port in use by app,
udpTable gives
8-14
SNMP Version1
Introduced in 1988, maintained by IETF.
UDP ports, 161 and 162, are the default ports reserved for
SNMP.
The agent listens for requests and replies to them over port 161.
Application Application
SNMP Manager PDU SNMP Manager PDU SNMP Agent
Application Application Application
get-next-request
get-next-request
get-next-request
snmpV2-trap
snmpV2-trap
snmpV2-trap
get-bulk-request
get-bulk-request
get-bulk-request
inform-request
inform-request
set-request
set-request
set-request
get-request
get-request
get-request
response
response
response
SNMP
SNMP PDU SNMP SNMP SNMP
PDU
IP IP IP
6-4
SNMP v2 PDU
0: GetRequest
1: GetNextRequest
2: Response
Associates error
3: Set Request Indicates one of a
with object instance.
4. Obsolete number of errors and
Set by
5. GetBulkRequest error types.
Set by ‘Response’
6. InformRequest SNMP Request to operation.
‘Response’
7. SNMPv2 Trap Response association Others set it to
operation.
Others set it to ‘0’
‘0’
Object 1 Object 2
PDU TYPE Request ID Error Status Error Index Value 1 Value 2
features.
1st
bit
Security Subsystem
Provides security services-authentication, encryption etc.
Contains multiple subsystem.
Private Public
UNI UNI
ATM ATM ATM ATM
User User User User
Figure 9.9 Private and Public ATM Network User Network Interfaces
M1
M2 M4 M4
• End user can be a work station, ATM switch, or any ATM device.
• OSI has defined five management interfaces:
ATM Public
interface ATM
End System Private
Private Network
ATM Switch Public Public
UNI UNI NNI
IME IME IME IME IME
• M–interface provides a top (User) ILMI (Net) (Usr)) ILMI
(Net) (Net)
Private Network
down management view of ATM Switch
IME
Private
NNI
IME IME
Private
NNI
IME IME
specific view of configuration (User) ILMI (Net)
ATM Switch
IME
ATM Switch
UNI
NNI IME
IME (Usr))
(Sym) IME
ILMI (Sym))
Physical Link
Virtual Path Connections
mgmt private
(2) (4)
mib-2
(1)
atmUniDxi (3)
SNMP
M1
SNMP Agent
RFC 1213
RFC 1573
ATM Device RFC 1695
M2
SNMP
Interface
SNMP Agent
RFC 1213
Proxy RFC 1573
ATM Device B RFC 1695
Transport MIB
ATM Device A
ILMI Agent ATM Agent
MIB Mgmt Entity Interface Mgmt Entity ILMI
ILMI MIB
Figure 9.14 Role of SNMP and ILMI in ATM Management (M2 Interface)
interfaces ifMIB
(2) ( 31)
ifMIBObjects
ifNumber ifTable (1)
(1) (2)
transmission
(10)
atmUniDxi (3)
atmForumUNI
(2)
atmfAddressRegistrationAdminGroup (11)
atmfPhysicalGroup (1) atmfVccAbrGroup (10)
atmfAtmLayerGroup (2) atmfVpcAbrGroup (9)
atmfAtmStatsGroup (3) atmfSrvcRegistryGroup (8)
atmfVpcGroup (4) atmfNetPrefixGroup (7)
• Class II:
– User ability to add, delete, and change VC between customer UNIs
– e.g. a customer wants to add new VP or increase VC in a given VP.
• Class I examples
– Retrieving performance and configuration for UNI link
– Public NMS reporting of a UNI link failure
• Class II examples
– Establishing a new VP
– Increase the number of VCs in a VP
Customer Network Management (CNM)
Carrier Management System
I II
M3 Link Status & Virtual
Configuration Configuration
Customer X
Monitoring Control
Network
Management
System M4 link
M2 Link Public
UNI
Private Public
ATM ATM
Network Network
Customer X Site 1
Public
UNI
ATM Public Public
Device UNI UNI
Private Private
Customer X Site 2 ATM ATM
Network Network
management
NML/EML reference point
M4 Interface
and /
or
• M4 interface defines conceptual
dual views
– Network element view
– Network view Managed System
Environment
• Two NMSs interface at network
view level ATM Network
View
• Each NMS interfaces with
network elements using network ATM NE
View
element view
Figure 9.21 Dual Views of the M4 Interface
Network Element View
NMS
Environment
M4 Interface
(ATM NE View Only)
SubNMS SubNMS
M4 Interface
(ATM NE View Only)
Multi-Supplier Single-Supplier
Subnetwork Subnetwork
M4 Interface
(ATM Network View Only)
SubNMS SubNMS
M4 Interface
(ATM NE View Only)
Multi-Supplier Single-Supplier
Subnetwork Subnetwork
atmfLanEmulation
(4)
• ELAN created by
– creating a new ELAN using elanMIB
– creating a LES entry for that ELAN using lesMIB
– creating a BUS entry for that ELAN using busMIB
ATM DXI Management
ATM ATM ATM
DTE DCE
DXI UNI Switch
NMS
Service
Management
Network System
Management Management
Element Resource
Management Management
Network System
Elements Resources
Port A
A1
Segment A
A2
Router
Port B
Segment B B1
Hub 2
B2
Figure 13.2 LAN Physical Configuration
A1 A2
Segment A / Hub 1
Router
Segment B / Hub 2
B1 B2
Segment B B1
Port A / Segment A
Port A / Segment B Segment A
Router
Switch A2
Segment B
Hub 2
B2
A1 (Hub 1) A2 (Hub 2)
Segment A / Hub 1 & 2
Router
switch
Segment B / Hub 1 & 2
B1 (Hub 1) B2 (Hub 2)
• Tools:
– Protocol analyzers
– RMON
– MRTG
Performance Metrics
• Macro-level
• Throughput
• Response time
• Availability
• Reliability
• Micro-level
• Bandwidth
• Utilization
• Error rate
• Peak load
• Average load
Traffic Flow Measurement
Network Characterization
International
Backbones / National
Regional / Midlevel
Stub / Enterprise
End-Systems / Hosts
• Problem isolation
– Manual mode using network and SNMP tools
– Problems in multiple components needs
tracking down the topology
– Automated mode using correlation technology
Performance Statistics
• Traffic statistics
• Error statistics
• Used in
– QoS tracking
– Performance tuning
– Validation of SLA
– Trend analysis
– Facility planning
– Functional accounting
Event Correlation Techniques
• Basic elements
– When a centralized NMS receives a notification
it is called receiving an event.
– A single problem source may cause multiple symptoms.
– Each symptom detected is reported as an independent event.
– we don’t treat each event independently and try to resolve it.
– Thus, it is important that the NMS correlates all these events
and isolate the root cause of problem.
Modify
Create Remove
attributes
new data data
of data
elements elements
elements
Match Select
Invoke
potential best
action
rules rule
• Knowledge base contains expert knowledge on problem symptoms and actions to be taken
if -> then
condition -> action
• Working memory contains topological and state information of the network; recognizes system going
into faulty state
• Inference engine in cooperation with knowledge base decides on the action to be taken
• Knowledge executes the action
Rule-Based Reasoning
• Rule-based paradigm is an iterative process
Router B Alarm B
Hub C Alarm C
Backbone
Network
Router
Model
Router
• Object-oriented model
• Model is a representation of the component it models
• Model has attributes and relations to other models
• Relationship between objects reflected in a similar relationship between models
Example:
MBR Event Correlator
Hub 1 fails
Recognized by Hub 1 model
13-21
Case
Library
Case-Based Reasoning
• A = f(F)
• A’ = f(F’)
• Functional relationship f(x) remains the same
CBR: Abstraction / Re-specialization
Trouble: file_transfer_throughput=F
Additional data: none
Resolution: A=f(F), adjust_network_load=A
Resolution status: good
Trouble: file_transfer_throughput=F
Additional data: none
Resolution: B=g(F), adjust_network_bandwidth=B
Resolution status: good
Trouble: file_transfer_throughput=F
Additional data: adjust_network_load=no
Resolution: B=g(F), adjust_network_bandwidth=B
Resolution status: good
Figure 13.15 Abstraction / Re-specialization
Adaptation
Fault Resolution
architecture; permits
manual intervention
Input Retrieve Adapt Propose Process
Application User-based
Determinators
Techniques Adaptation
User
Correlator Problems
Network Monitors
• Monitors capture the alarm events and input them to the correlator
• Configuration model contains the configuration of the network
• Event model represents events and their causal
relationships
• Correlator correlates alarm events with the event model and
determines the common problem that caused the alarm events
Codebook Approach
Approach:
• Correlation algorithms based upon coding approach to even
correlation
• Problem events viewed as messages generated by a system and
encoded in sets of alarms that they cause
• Correlator decodes the problem messages to identify the problems
Coding technique comprises of two phases:
1. Codebook selection phase: Problems to be monitored are
identified and the symptoms/alarms they generate are associated
with the problem using expert knowledge.
This generates codebook (problem-symptom matrix)
2. Correlator compares the alarm events with the codebook and
identifies the problem.
Causality Graph
E4 E5 E6 E7
E1 E2 E3
P1 P2 P3
P1 P2 P3
5
11
8
7
3 4
1 2
5
11
8
7 S
3 4 S
S
1 2
P P
(b) Problem-Symptom Causality Graph
1 11 2
P1 P2 P11
S3 1 1 1
S6 0 1 0
S9 1 0 1
Correlation Matrix
• Note that problems 1 and 11 produce identical symptoms thus
unable to distinguish between problem 1 and 11
Codebook Enhancements
response ping
receive response
Backbone
Network
Router
Physical Network
response ping
State Transition Graph
receive response
No response
pinged twice
(Ground state)
No response
pinged 3 times
No response
Request
No response
receive response
from Router, ping router
from router
No action
Response
Response received
from Router
Action: Send Alarm
Request
Send Request Receive Request
Message
Communication
Response Request Send Receive
Channel
Response
Receive Response Send Response
Message
Disclosure
• References:
– Formal statement of rules for protecting organization’s
technology and assets (RFC 2196)
– Introduction to Firewalls (NIST)
– Orange Book by National Computer Security
Center (NCSC) rates computers based on
security design features
Secured Communication Network
Client A
Firewall
Secured Client B
Gateway
Network A Router
Network B
Server A
SMTP Gateway
Ethernet
Packet Filtering
FTP Gateway Internet
Router
Screened
SMTP & FTP
Secured Network
Proxy
Services
Application
Gateway
• Firewalls 1 and 2 route traffic only from and to the secured LAN
• Secured LAN is gateway LAN
• Behavior of application gateway dependent on the application
• FTP traffic stored and forwarded after validation
• TELNET hosts validated for the session and then direct communication
established
• Firewalls protect a secure site by checking address e.g. IP
address, transport parameters such as FTP, and applications.
• Security threats
– Modification of information
– Masquerade
– Message stream modification
– Disclosure
• Hardware and software solutions to authentication.
• Most secure communication is software based. Its foundation lies in
Cryptography
Secret Key Cryptography
Transmission
Channel
Plaintext Encryption Ciphertext Decryption Plaintext
Secret Key
Secret Key
Figure 13.33 Basic Cryptographic Communication
• Caesar cipher: each letter replaced by another letter, which is three letters behind in the alphabet
• Maximum of 26 attempts to decode Caesar cipher
• Monoalphabetic cipher: Replace a letter with another randomly chosen; Maximum attempts to
decode 26!
• One secret key is needed between each pair
• Two standard algorithms implement secret key cryptography:
– DES (Data Encryption Standard): 64-bit message blocks and 56-bit key
– IDEA (International Data Encryption Algorithm): 64-bit message blocks and 128-bit key
• Message block derived using CBC (Cipher Block Chaining)
• Principle based on rearranging the blocks several times based on predetermined algorithm and
secret key
Public Key Cryptography
Transmission
Channel
Plaintext Encryption Ciphertext Decryption Plaintext
Private Key
Public Key
Example:
$ md5
The quick brown fox jumped over the lazy dog
^D
d8e8fca2dc0f896fd7cb4cb0031ba249
Digital Signature
Plaintext
Plaintext
Plaintext
Plaintext
Transmission
Channel
Digital Signature
Encryption Signed Ciphertext Decryption
Signature Validation
Service
Application
Server / Authentication
Service
DEK
IK
MIC
(a) MIC-CLEAR PEM Process Encrypted DEK
Encoded Text
MIC/DEK
Encoder
SMTP Format SMTP MIC MIC ONLY e-mail
User Plaintext
Text
(Printable
Conversion Generator PEM System
code)
MIC
IK
Encrypted DEK
(b) MIC-ONLY PEM Process
Encrypted &
Encoded
Message
MIC/DEK
Encoder
SMTP Format SMTP MIC Padding & ENCRYPTED e-mail
User Plaintext (Printable
Conversion Text Generator Encryption PEM System
code)
DEK
DEK
Legend:
IK
DEK Data Encryption Key
IK Interexchange Key
MIC Message Integrity Code
(c) ENCRYPTED PEM Process
SMTP Simple Mail Transfer Protocol
e-mail e-mail
Concatenation
conversion system
Signature
Plaintext
Generation
• Signature generation
– Uses MD5 to generate hash code
– Encrypts hash code with sender’s private key using RSA algorithm
• Encryption of the message done using IDEA or RSA
• Compression done with ZIP
• e-mail conversion done using Radix-64
• PGP similar to encrypted PEM with added compression.
• Then main difference b/w PGP and PEM is how the public key is administered (PGP-Owner).
SNMPv3 Security (Outgoing message)
Encrypted
scopedPDU
scopedPDU Privacy
USM
Encryption Key Module wholeMsg HMAC Gen.
authenticated
Authentication wholeMsg
Module
password authKey
USM
authoritativeSnmpEngineId
• Least developed
• Usage of resources
• Hidden cost of IT usage (libraries)
• Functional accounting
• Business application
Report Management
Table 13.1 Planning and Management Reports
Category Reports
Quality of service / Network availability
Service level agreement Systems availability
Problem reports
Service response
Customer satisfaction
Traffic trends Traffic patterns
Analysis of internal traffic volume
Analysis of external traffic volume
Technology trends Current status
Technology migration projection
Cost of Operations Functional
Usage
Personnel
Policy Space
Domain Space
Rule Space
Telecommunication Network
Transmission Transmission
Test System Test System
Nodes
Voice Voice
Public Switch Public Switch
Transmission Links
Data / Telecommunication
Network
Traffic Traffic
Counter Counter
Nodes
Customers Customers
Network Network
Q3 Q3
Operations Systems
X Operations Systems
Q3 Q3
OS OS OS OS
F F
Workstation Workstation
• Components
• Interfaces Figure 11.4 TMN Conceptual Model
TMN Architecture
TMN Architecture
Architecture
x
• Five Functional Blocks
TMN A
OSF q3 OSF
1. OSF: Functions
performed by Operations q3
testing, accounting,
qx qx
trouble tracking
2. NEF: Functions needed to NEF QAF
MF Mediation Function
NEF Network Element Function
support network elements OSF Operations Systems Function
QAF Q Adapter Function
(hub, routers, switches) WSF Workstation Function
NE providing information for
management ; packet
dropped collision rate are
Figure 11.7 TMN Functional Architecture
considered as NEF
Functional Architecture TMN B OSF
x
3. MF: addresses the operations
TMN A
performed on the information content OSF q3 OSF
aspect.
• The conversion function that converts q3
q3
machine readable information to human- MF f WSF
interpretable format
• Belongs in one of the other three functional qx qx
TMN X Operations
System
(OS)
X/F/Q3
F/Q3 F
Mediation
Device
(MD)
Q3
Qx
Q3
Data Communications Network (DCN)
Qx Qx
Network Network
Q Adapter Q Adapter
Element Element
(QA) (QA)
(NE) (NE)
Physical Architecture
Operations
System
(OS)
function as well as mediation device, which Data Communications Network (DCN) Workstation
Q3
and QA/NE. Data Communications Network (DCN)
• The top layer is the business management layer, concerned with managing a
communications business such as fiscal considerations, personal needs, project
management, and customer needs and satisfaction.
TMN TMN Management Services
Services
Business Service Network Element
Management Management Management Management
CMISE
M-GET / M-SET /
GET-REQUEST SET-REQUEST M-CREATE
ACSE ROSE
Network Element
MF QAF
hierarchy.
• They invoke the system management functions defined
System Management Functions TMN Functional Components
Object Alarm NM Presentation
Management Management Manager Function
•
GET-REQUEST SET-REQUEST
TMN functions.
Figure 11.13 TMN Services and Functions
element.
• ACSE Application control service
System Management Functions TMN Functional Components
Object Alarm NM Presentation
Management Management Manager Function
element.
• In SNMP management model, the M-GET / M-SET /
CMISE
ACSE ROSE
Example
Layered Architecture TMN Architecture
(NMF) Business
Management
Customer
Service
Management
Service-
q3 Service Q3 impacting
Ref. Point Configuration
Events
q3 Equipment Q3 Equipment
Ref. Point Configuration Alarms
Net Element
Element Net Element Net Element
Trans Eqpt
Management Cust Admin Switch Mgmt
Mgmt
• Then objective is to help companies implement management standards across a wide range of
supplier’s equipment.
• It specifies mapping b/w the Internet and OSI standards that helps TMN implementation in a
hybrid management environment.