chapter 19: network management business data communications, 4e

31
Chapter 19: Network Management Business Data Communications, 4e

Post on 18-Dec-2015

223 views

Category:

Documents


2 download

TRANSCRIPT

Chapter 19:Network Management

Business Data Communications, 4e

Business Data Communications, 4e 2

Network Management Requirements

Fault Management Accounting Management Configuration and Name Management Performance Management Security Management

Business Data Communications, 4e 3

Fault Management

A fault is an abnormal condition that requires management attention (or action) to repair

Fault is usually indicated by failure to operate correctly or by excessive errors

Users expect quick and reliable resolution

Business Data Communications, 4e 4

Responding to Faults

When faults occur, it is critical to quickly: Determine exactly where the fault is Isolate the rest of the network from the failure so that it

can continue to function without interference Reconfigure or modify the network to minimize the effect

of removing the failed component(s) Repair or replace the failed components to restore the

network to its initial state

Business Data Communications, 4e 5

Accounting Management Reasons for accounting management:

Internal chargebacks on network use User(s) may be abusing access privileges and burdening the

network at the expense of other users Users may be making inefficient use of the network, and the

network The network manager is in a better position to plan for

network growth if user activity is known in sufficient detail.

Business Data Communications, 4e 6

Configuration Management

Concerned with: initializing a network and grace-fully shutting down part

or all of the network maintaining, adding, and updating the relationships

among components and the status of components themselves during network operation

Business Data Communications, 4e 7

Performance Management Issues of concern to the network manager include:

What is the level of capacity utilization? Is there excessive traffic? Has throughput been reduced to unacceptable levels? Are there bottlenecks? Is response time increasing?

Network managers need performance statistics to help them plan, manage, and maintain large networks

Business Data Communications, 4e 8

Security Management

Concerned with generating, distributing, and storing encryption keys monitoring and controlling access to networks access to all or part of the network management

information collection, storage, and examination of audit records and

security logs

Business Data Communications, 4e 9

Network Management Systems

Collection of tools for network monitoring and control, integrated in these ways: A single user-friendly operator interface for performing

most or all network management tasks A minimal amount of separate equipment

consists of incremental hardware and software additions implemented among existing network components

Business Data Communications, 4e 10

Network Management System Architecture

Business Data Communications, 4e 11

Components of the NMS

All nodes run the Network Management Entity (NME) software

Network control host or manager runs the Network Management Application (NMA)

Other nodes are considered agents

Business Data Communications, 4e 12

Network Management Entity Collection of software contained in each network node,

devoted to the network management task Performs the following tasks:

Collect statistics on communications and network-related activities.

Store statistics locally Respond to commands from the network control center Send messages to NCC when local conditions undergo a

significant change

Business Data Communications, 4e 13

IBM Network Management Architecture and NetView

Associated with IBM’s Systems Network Architecture (SNA)

IBM wants to provide the single, unifying framework into which all other network management products feed and from which all the equipment in a user’s network can be controlled

Business Data Communications, 4e 14

Network Management Categories

SNA network management is composed of: Problem management Change management Configuration management Performance and accounting management

Business Data Communications, 4e 15

Problem Management

Problem determination Problem diagnosis Problem bypass and recovery Problem resolution Problem tracking and control

Business Data Communications, 4e 16

Change Management

Software change control Microcode change control Hardware change control

Business Data Communications, 4e 17

Configuration Management

Physical/logical resource identification Resource relationship identification

Business Data Communications, 4e 18

Performance & Accounting Management

Response-time monitoring Availability monitoring Utilization monitoring Component delay monitoring Performance tuning Performance tracking and control Accounting

Business Data Communications, 4e 19

NetView Software Control facility

Provides the capability to operate the network.

Hardware monitor collects notifications of failures or

significant events

Session monitor Collects session-related

information on logical components of the network; includes measurements of data on response time, session failure

Status monitor Displays status information;

reactivates network resources following failures

Help facilities Descriptions of fields on

displays, and a systematic problem-solving facility

Customization facilities: Permits a user to tailor NetView

Business Data Communications, 4e 20

Technical Control Automatic and remote testing and monitoring of the

system, to reduce downtime due to the need to locate service personnel

Restoring and/or reconfiguring the system upon failure in real time

Providing network performance and functioning statistics to facilitate planning and management for high availability

Business Data Communications, 4e 21

Component-Level Technical Control

Line Monitors Captures the signal between a host system and the

network Generally employed only on the network end

Protocol Analyzers Can also simulate various network components Can test communication protocols and codes Typically handles up to layer 3 of the OSI architecture

Business Data Communications, 4e 22

Network Technical Control Systems Integrate control devices and centralize the control of the network

Business Data Communications, 4e 23

Performance Monitoring

After availability, the second most important characteristic of a network is performance

Performance data must be available in sufficient detail to be able to assess the bottleneck that is causing the problem and to plan appropriate remedial action

Business Data Communications, 4e 24

Component-Level Monitoring Response-time monitors

Measures, displays, and records response time of each transaction and the average response time

Hardware monitors Events: Number of occurrences of specific events Timing: Timing the duration of a specific signal

Software monitors Gathers and reports statistics on hardware and systems and

applications software activity

Business Data Communications, 4e 25

Network Monitoring Systems

Business Data Communications, 4e 26

Indicators Reported by Network Monitors

Service Parameters Availability Response Time Accuracy and Integrity

Efficiency Parameters Througput Polling Utilization

Business Data Communications, 4e 27

Simple Network ManagementProtocol (SNMP)

Network Management Model Management station Management agent Management information base Network management protocol

Business Data Communications, 4e 28

Role of SNMP

Business Data Communications, 4e 29

Protocol Specification

Transmission of a message Receipt of a message Variable bindings

Business Data Communications, 4e 30

SNMPv2

Released in 1992, revised in 1996 Addressed functional deficiencies in SNMP Accommodates decentralized network management Improves efficiency of data transfer

Business Data Communications, 4e 31

SNMPv3

Released in 1998, addressed security deficiencies in SNMP and SNMPv2

Does not provide a complete SNMP capability; defines an overall SNMP architecture and a set of security capabilities for use with SNMPv2

Provides three important services: authentication, privacy, and access control