network management

127
• Network Management https://store.theartofservice.com/the-network-management- toolkit.html

Upload: jessica-houston

Post on 30-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Management

• Network Management

https://store.theartofservice.com/the-network-management-toolkit.html

Page 2: Network Management

Network management

1 In computer networks, network management refers to the activities, methods, procedures, and tools that

pertain to the operation, administration, maintenance, and provisioning of

networked systems. Network management is essential to command and control practices and is generally carried out of a network operations

center.https://store.theartofservice.com/the-network-management-toolkit.html

Page 3: Network Management

Network management

1 Operation deals with keeping the network (and the services that the network provides) up and running

smoothly. It includes monitoring the network to spot problems as soon as

possible, ideally before users are affected.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 4: Network Management

Network management

1 Administration deals with keeping track of resources in the network and how they are assigned. It includes all the "housekeeping" that is necessary

to keep the network under control.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 5: Network Management

Network management

1 Maintenance is concerned with performing repairs and upgrades—for example, when

equipment must be replaced, when a router needs a patch for an Operating System image, when a new switch is

added to a network. Maintenance also involves corrective and preventive

measures to make the managed network run "better", such as adjusting device

configuration parameters.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 6: Network Management

Network management

1 Provisioning is concerned with configuring resources in the network

to support a given service. For example, this might include setting

up the network so that a new customer can receive voice service.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 7: Network Management

Network management

1 A common way of characterizing network management functions is

FCAPS—Fault, Configuration, Accounting, Performance and

Security.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 8: Network Management

Network management

1 Functions that are performed as part of network management accordingly include controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a network,

network planning, frequency allocation, predetermined traffic routing to support load

balancing, cryptographic key distribution authorization, configuration management, fault

management, security management, performance management, bandwidth

management, Route analytics and accounting management.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 9: Network Management

Network management

1 Data for network management is collected through several mechanisms, including

agents installed on infrastructure, synthetic monitoring that simulates transactions, logs of activity, sniffers and real user monitoring.

In the past network management mainly consisted of monitoring whether devices were up or down; today performance management

has become a crucial part of the IT team's role which brings about a host of challenges—

especially for global organizations.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 10: Network Management

Network management

1 Note: Network management does not include user terminal

equipment.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 11: Network Management

Network management - Technologies

1 A small number of accessory methods exist to support network and network device

management. Access methods include the SNMP, command-line interface (CLIs), custom

XML, CMIP, Windows Management Instrumentation (WMI), Transaction Language 1,

CORBA, NETCONF, and the Java Management Extensions (JMX). Internet service providers

(ISP) use a technology known as deep packet inspection in order to regulate network

congestion and lessen Internet bottlenecks.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 12: Network Management

Network management - Technologies

1 Schemas include the WBEM, the Common Information Model, and MTOSI amongst

others.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 13: Network Management

Network management - Technologies

1 In the United States, Medical Service Providers provide a niche marketing utility for managed

service providers as HIPAA legislation consistently increases demands for

knowledgeable providers. Medical Service Providers are liable for the protection of their clients' confidential information, including in an electronic realm. This liability creates a

significant need for managed service providers who can provide secure infrastructure for

transportation of medical data.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 14: Network Management

Synchronous Digital Hierarchy - Network management system terminal

1 :Local craftspersons (telephone network engineers) can access a

SDH/ SONET network element on a craft port and issue commands

through a dumb terminal or terminal emulation program running on a laptop. This interface can also be

attached to a console server, allowing for remote out-of-band management and Data logging|

logging.https://store.theartofservice.com/the-network-management-toolkit.html

Page 15: Network Management

Synchronous Digital Hierarchy - Network management system terminal

1 This will often consist of software running on a Workstation covering a

number of SDH/SONET network elements

https://store.theartofservice.com/the-network-management-toolkit.html

Page 16: Network Management

Simple Network Management Protocol

1 It consists of a set of Technical standard|standards for network

management, including an application layer protocol

(computing)|protocol, a database logical schema|schema, and a set of

data objects.RFC 3411— An Architecture for Describing Simple

Network Management Protocol (SNMP) Management Frameworks

https://store.theartofservice.com/the-network-management-toolkit.html

Page 17: Network Management

Simple Network Management Protocol

1 SNMP exposes management data in the form of variables on the

managed systems, which describe the system configuration. These

variables can then be queried (and sometimes set) by managing

applications.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 18: Network Management

Simple Network Management Protocol - Overview and basic concepts

1 In typical SNMP uses, one or more administrative computers, called

managers, have the task of monitoring or managing a group of

hosts or devices on a computer network. Each managed system executes, at all times, a software component called an agent which

reports information via SNMP to the manager.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 19: Network Management

Simple Network Management Protocol - Overview and basic concepts

1 Essentially, SNMP agents expose management data on the managed systems as variables.

The protocol also permits active management tasks, such as modifying and applying a new configuration through remote modification of these variables. The variables accessible via

SNMP are organized in hierarchies. These hierarchies, and other metadata (such as type and description of the variable), are described

by Management Information Bases (MIBs).

https://store.theartofservice.com/the-network-management-toolkit.html

Page 20: Network Management

Simple Network Management Protocol - Overview and basic concepts

1 *Agent— software which runs on

managed devices

https://store.theartofservice.com/the-network-management-toolkit.html

Page 21: Network Management

Simple Network Management Protocol - Overview and basic concepts

1 *Network management system (NMS)— software

which runs on the manager

https://store.theartofservice.com/the-network-management-toolkit.html

Page 22: Network Management

Simple Network Management Protocol - Overview and basic concepts

1 A managed device is a network node that implements an SNMP interface

that allows unidirectional (read-only) or bidirectional (read and write)

access to node-specific information

https://store.theartofservice.com/the-network-management-toolkit.html

Page 23: Network Management

Simple Network Management Protocol - Overview and basic concepts

1 An agent is a network-management software module that resides on a

managed device. An agent has local knowledge of management

information and translates that information to or from an SNMP-

specific form.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 24: Network Management

Simple Network Management Protocol - Overview and basic concepts

1 A network management system (NMS) executes applications that

monitor and control managed devices. NMSs provide the bulk of the

processing and memory resources required for network management.

One or more NMSs may exist on any managed network.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 25: Network Management

Simple Network Management Protocol - Management information base (MIB)

1 SNMP itself does not define which information (which variables) a managed system should

offer

https://store.theartofservice.com/the-network-management-toolkit.html

Page 26: Network Management

Simple Network Management Protocol - Protocol details

1 SNMP operates in the Application Layer of the Internet Protocol Suite (Layer 7 of the OSI

model)

https://store.theartofservice.com/the-network-management-toolkit.html

Page 27: Network Management

Simple Network Management Protocol - Protocol details

1 SNMPv1 specifies five core protocol data units (PDUs). Two other PDUs, GetBulkRequest and InformRequest were added in SNMPv2 and carried

over to SNMPv3.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 28: Network Management

Simple Network Management Protocol - Protocol details

1 The seven SNMP protocol data units

(PDUs) are as follows:

https://store.theartofservice.com/the-network-management-toolkit.html

Page 29: Network Management

Simple Network Management Protocol - GetRequest

1 A 'manager-to-agent' request to retrieve the value of a variable or list

of variables. Desired variables are specified in variable bindings (values

are not used). Retrieval of the specified variable values is to be

done as an atomic operation by the agent. A Response with current

values is returned.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 30: Network Management

Simple Network Management Protocol - SetRequest

1 A 'manager-to-agent' request to change the value of a variable or list

of variables. Variable bindings are specified in the body of the request.

Changes to all specified variables are to be made as an atomic operation

by the agent. A Response with (current) new values for the variables

is returned.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 31: Network Management

Simple Network Management Protocol - GetNextRequest

1 A 'manager-to-agent' request to discover available variables and their

values. Returns a Response with variable binding for the

lexicographically next variable in the MIB. The entire MIB of an agent can be walked by iterative application of GetNextRequest starting at OID 0.

Rows of a table can be read by specifying column OIDs in the

variable bindings of the request.https://store.theartofservice.com/the-network-management-toolkit.html

Page 32: Network Management

Simple Network Management Protocol - GetBulkRequest

1 Optimized version of GetNextRequest. A 'manager-to-

agent' request for multiple iterations of GetNextRequest. Returns a

Response with multiple variable bindings walked from the variable binding or bindings in the request.

PDU specific non-repeaters and max-repetitions fields are used to control response behavior. GetBulkRequest

was introduced in SNMPv2.https://store.theartofservice.com/the-network-management-toolkit.html

Page 33: Network Management

Simple Network Management Protocol - Response

1 Returns variable bindings and acknowledgement from 'agent to

manager' for GetRequest, SetRequest, GetNextRequest,

GetBulkRequest and InformRequest. Error reporting is provided by error-

status and error-index fields. Although it was used as a response to both gets and sets, this PDU was

called GetResponse in SNMPv1.https://store.theartofservice.com/the-network-management-toolkit.html

Page 34: Network Management

Simple Network Management Protocol - Trap

1 Asynchronous notification from 'agent to manager'

https://store.theartofservice.com/the-network-management-toolkit.html

Page 35: Network Management

Simple Network Management Protocol - InformRequest

1 Acknowledged asynchronous notification

https://store.theartofservice.com/the-network-management-toolkit.html

Page 36: Network Management

Simple Network Management Protocol - Version 1

1 SNMP version 1 (SNMPv1) is the initial implementation of the SNMP protocol.

SNMPv1 operates over protocols such as User Datagram Protocol (UDP), Internet

Protocol (IP), OSI Connectionless Network Service (CLNS), AppleTalk Datagram-Delivery

Protocol (DDP), and Novell Internet Packet Exchange (IPX). SNMPv1 is widely used and is the De facto standard|de facto network-

management protocol in the Internet community.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 37: Network Management

Simple Network Management Protocol - Version 1

1 The first Request for Comments|RFCs for SNMP, now known as SNMPv1, appeared in

1988:

https://store.theartofservice.com/the-network-management-toolkit.html

Page 38: Network Management

Simple Network Management Protocol - Version 1

1 * RFC 1065— Structure and identification of management information for TCP/IP-based

internets

https://store.theartofservice.com/the-network-management-toolkit.html

Page 39: Network Management

Simple Network Management Protocol - Version 1

1 * RFC 1155— Structure and identification of management information for TCP/IP-based

internets

https://store.theartofservice.com/the-network-management-toolkit.html

Page 40: Network Management

Simple Network Management Protocol - Version 1

1 After a short time, RFC 1156 (MIB-1) was replaced by more often used:

https://store.theartofservice.com/the-network-management-toolkit.html

Page 41: Network Management

Simple Network Management Protocol - Version 1

1 Version 1 has been criticized for its poor

security

https://store.theartofservice.com/the-network-management-toolkit.html

Page 42: Network Management

Simple Network Management Protocol - Version 2

1 SNMPv2 (RFC 1441–RFC 1452), revises version 1 and includes improvements in the areas of performance, security, confidentiality, and manager-to-manager communications. It

introduced GetBulkRequest, an alternative to iterative GetNextRequests for retrieving large

amounts of management data in a single request. However, the new party-based

security system in SNMPv2, viewed by many as overly complex, was not widely accepted.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 43: Network Management

Simple Network Management Protocol - Version 2

1 Community-Based Simple Network Management Protocol version 2, or

SNMPv2c, is defined in RFC 1901–RFC 1908. In its initial stages, this was also informally known as SNMPv1.5. SNMPv2c comprises

SNMPv2 without the controversial new SNMP v2 security model, using instead the simple

community-based security scheme of SNMPv1. While officially only a Draft

Standard, this is widely considered the de facto SNMPv2 standard.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 44: Network Management

Simple Network Management Protocol - Version 2

1 User-Based Simple Network Management Protocol version 2, or SNMPv2u, is defined in RFC 1909–

RFC 1910. This is a compromise that attempts to offer greater security

than SNMPv1, but without incurring the high complexity of SNMPv2. A

variant of this was commercialized as SNMP v2*, and the mechanism was eventually adopted as one of two security frameworks in SNMP v3.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 45: Network Management

Simple Network Management Protocol - SNMPv1 SNMPv2c interoperability

1 As presently specified, SNMPv2c is incompatible with SNMPv1 in two key areas: message formats and protocol operations.

SNMPv2c messages use different header and protocol data unit (PDU) formats from

SNMPv1 messages. SNMPv2c also uses two protocol operations that are not specified in SNMPv1. Furthermore, RFC 2576 defines two possible SNMPv1/v2c coexistence strategies:

proxy agents and bilingual network-management systems.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 46: Network Management

Simple Network Management Protocol - Proxy agents

1 * A SNMPv2 NMS issues a command

intended for a SNMPv1 agent.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 47: Network Management

Simple Network Management Protocol - Bilingual network-management system

1 Bilingual SNMPv2 network-management systems support both SNMPv1 and SNMPv2.

To support this dual-management environment, a management application in

the bilingual NMS must contact an agent. The NMS then examines information stored in a local database to determine whether the

agent supports SNMPv1 or SNMPv2. Based on the information in the database, the NMS communicates with the agent using the

appropriate version of SNMP.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 48: Network Management

Simple Network Management Protocol - Version 3

1 Although SNMPv3 makes no changes to the protocol aside from the

addition of cryptographic security, it looks much different due to new

textual conventions, concepts, and terminology.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 49: Network Management

Simple Network Management Protocol - Version 3

1 SNMPv3 primarily added security and remote configuration enhancements

to SNMP.[http://www.simple-times.org/pub/simple-times/issues/5-1.html In This Issue: SNMP Version 3]

[http://www.simple-times.org/ The Simple Times] ISSN 1060-6080

https://store.theartofservice.com/the-network-management-toolkit.html

Page 50: Network Management

Simple Network Management Protocol - Version 3

1 Security has been the biggest weakness of SNMP since the beginning. Authentication

in SNMP Versions 1 and 2 amounts to nothing more than a password (community

string) sent in clear text between a manager and agent. Each SNMPv3

message contains security parameters which are encoded as an octet string. The

meaning of these security parameters depends on the security model being used.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 51: Network Management

Simple Network Management Protocol - Version 3

1 SNMPv3 provides important security features:

https://store.theartofservice.com/the-network-management-toolkit.html

Page 52: Network Management

Simple Network Management Protocol - Version 3

1 * Confidentiality - Encryption of packets to prevent snooping by an unauthorized source.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 53: Network Management

Simple Network Management Protocol - Version 3

1 * Integrity - Data integrity|Message integrity to ensure that a packet has not been tampered while in transit including an optional packet replay

protection mechanism.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 54: Network Management

Simple Network Management Protocol - Version 3

1 * Authentication - to verify that the message is from a valid source.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 55: Network Management

Simple Network Management Protocol - Version 3

1 the Internet Engineering Task Force|IETF recognizes Simple Network

Management Protocol version 3 as defined by RFC 3411–RFC 3418 (also known as STD0062) as the current

standard version of SNMP

https://store.theartofservice.com/the-network-management-toolkit.html

Page 56: Network Management

Simple Network Management Protocol - Version 3

1 In practice, SNMP implementations often support multiple versions: typically SNMPv1, SNMPv2c, and SNMPv3.RFC 3584 Coexistence

between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework

https://store.theartofservice.com/the-network-management-toolkit.html

Page 57: Network Management

Simple Network Management Protocol - Implementation issues

1 SNMP implementations vary across platform vendors. In some cases,

SNMP is an added feature, and is not taken seriously enough to be an

element of the core design. Some major equipment vendors tend to

over-extend their proprietary Command line interface|command

line interface (CLI) centric configuration and control systems.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 58: Network Management

Simple Network Management Protocol - Implementation issues

1 SNMP's seemingly simple tree structure and linear indexing may

not always be understood well enough within the internal data

structures that are elements of a platform's basic design.

Consequently, processing SNMP queries on certain data sets may

result in higher CPU utilization than necessary. One example of this

would be large routing tables, such as Border Gateway Protocol|BGP or

Interior Gateway Protocol|IGP.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 59: Network Management

Simple Network Management Protocol - Resource indexing

1 Modular devices may dynamically increase or decrease their SNMP indices (aka instances) whenever

slotted hardware is added or removed

https://store.theartofservice.com/the-network-management-toolkit.html

Page 60: Network Management

Simple Network Management Protocol - Resource indexing

1 Index assignments for an SNMP device instance may change from poll to poll

mostly as a result of changes initiated by the system administrator. If information is needed for a particular interface, it is imperative to determine the SNMP index

before retrieving the data needed. Generally, a description table like ifDescr will map a user friendly name like Serial 0/1 (Blade 0, port 1) to an SNMP index.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 61: Network Management

Simple Network Management Protocol - Security implications

1 * SNMP versions 1 and 2c are subject to Packet sniffer|packet sniffing of

the clear text community string from the network traffic, because they do

not implement encryption.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 62: Network Management

Simple Network Management Protocol - Security implications

1 * All versions of SNMP are subject to Brute force attack|brute force and dictionary attacks for guessing the community strings, authentication

strings, authentication keys, encryption strings, or encryption

keys, because they do not implement a Challenge-handshake

authentication protocol|challenge-response handshake.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 63: Network Management

Simple Network Management Protocol - Security implications

1 * Although SNMP works over Transmission Control Protocol|TCP and other protocols, it

is most commonly used over User datagram protocol|UDP that is connectionless and

vulnerable to IP spoofing attacks. Thus, all versions are subject to bypassing device

access lists that might have been implemented to restrict SNMP access,

though SNMPv3's other security mechanisms should prevent a successful

attack.https://store.theartofservice.com/the-network-management-toolkit.html

Page 64: Network Management

Simple Network Management Protocol - Security implications

1 * SNMP's powerful configuration (write) capabilities are not being fully

utilized by many vendors, partly because of a lack of security in SNMP versions before SNMPv3 and partly

because many devices simply are not capable of being configured via individual MIB object changes.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 65: Network Management

Simple Network Management Protocol - Security implications

1 * SNMP tops the list of the SANS Institute|SANS Institute's Common

Default Configuration Issues with the issue of default SNMP community strings set to ‘public’ and ‘private’ and was number ten on the SANS

[http://www.sans.org/top20/2000/ Top 10 Most Critical Internet Security

Threats] for the year 2000.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 66: Network Management

Simple Network Management Protocol - Autodiscovery

1 SNMP by itself is simply a protocol for collecting and organizing information

https://store.theartofservice.com/the-network-management-toolkit.html

Page 67: Network Management

TM Forum - OSI/Network Management Forum

1 The OSI/Network Management Forum was founded in 1988 by eight

companies to collaboratively solve systems and operational

management issues with the OSI protocols.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 68: Network Management

TM Forum - OSI/Network Management Forum

1 In 1998 the name was changed to the

TeleManagement Forum.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 69: Network Management

IEEE 802.11v - Wireless Network Management

1 802.11v is the Wireless Network Management standardization|

standard for the IEEE 802.11 family of standards. 802.11v allows client

devices to exchange information about the network topology,

including information about the RF environment, making each client network aware, facilitating overall

improvement of the wireless network.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 70: Network Management

List of storage area network management systems - Systems

1 * Brocade Communications

Systems|Brocade Fabric Manager

https://store.theartofservice.com/the-network-management-toolkit.html

Page 71: Network Management

List of storage area network management systems - Systems

1 * DataCore Software|DataCore SANsymphony line, storage virtualization software

https://store.theartofservice.com/the-network-management-toolkit.html

Page 72: Network Management

List of storage area network management systems - Systems

1 * Dell EqualLogic

https://store.theartofservice.com/the-network-management-toolkit.html

Page 73: Network Management

List of storage area network management systems - Systems

1 * EMC Corporation|EMC VisualSAN

https://store.theartofservice.com/the-network-management-toolkit.html

Page 74: Network Management

List of storage area network management systems - Systems

1 * IBM SAN Volume Controller

https://store.theartofservice.com/the-network-management-toolkit.html

Page 75: Network Management

List of storage area network management systems - Systems

1 * Openfiler Free software|free rPath Linux distribution based

software

https://store.theartofservice.com/the-network-management-toolkit.html

Page 76: Network Management

List of storage area network management systems - Systems

1 * Quantum Corporation StorNext

https://store.theartofservice.com/the-network-management-toolkit.html

Page 77: Network Management

Hitachi Content Platform - Virtual Network Management (version 6.0+)

1 Release 6.0 of HCP introduces support for virtual networking. Virtual

networking is a technology that enables the overlay of multiple

logical network configurations onto a single physical network. Virtual

networking enables the segregation of network traffic between clients

and different HCP tenants, between management and data access

functions, and between system-level and tenant-level traffic.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 78: Network Management

Hitachi Content Platform - Virtual Network Management (version 6.0+)

1 The Virtual Network Management (VNeM) feature

allows for the following:

https://store.theartofservice.com/the-network-management-toolkit.html

Page 79: Network Management

Hitachi Content Platform - Virtual Network Management (version 6.0+)

1 * Creation of user defined management data networks (tagged and untagged) at the Hitachi Content Platform#Namespaces_and_Tenants |

tenant level.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 80: Network Management

Hitachi Content Platform - Virtual Network Management (version 6.0+)

1 ** Each with individual domains if desired.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 81: Network Management

Hitachi Content Platform - Virtual Network Management (version 6.0+)

1 ** Each fully capable of having one or

more SSL certificate associations.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 82: Network Management

ZOHO Corporation - Network Management Framework

1 The company started as a Network Management Framework provider for

Telecom Network equipment vendors. Initially the company

developed few other software such as SNMP API stack, Element

Management System (EMS). The NMS framework is marketed as WebNMS which competes with

similar NMS products from HP, CA and few other enterprises.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 83: Network Management

Network management system

1 'Network monitoring' is the use of a system that constantly monitors

a computer network for slow or failing components and that notifies the network administrator (via email,

SMS or other alarms) in case of outages. It is part of network

management.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 84: Network Management

Network management system - Network tomography

1 Network tomography is an important area of network measurement, which deals with monitoring the health of

various links in a network using end-to-end probes sent by agents located

at vantage points in the network/Internet.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 85: Network Management

Network management system - Servers around the globe

1 Network monitoring services usually have a number of servers around the globe - for

example in America, Europe, Asia, Australia and other locations. By having multiple

servers in different geographic locations, a monitoring service can determine if a Web

server is available across different networks worldwide. The more the locations used, the

more complete is the picture on network availability.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 86: Network Management

Network management system - Notification

1 As the information brought by web server monitoring services is in most cases urgent and may be of crucial

importance, various notification methods may be used: e-mail, land-

line and cell phones, SMS, fax, pagers, etc.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 87: Network Management

Comcast Cable Communications - Network management and peering

1 Comcast overturned the illegality of its network management in 2010, as the court ruled that the FCC lacked

the authority to enforce net neutrality under the FCC's current

regulatory policy

https://store.theartofservice.com/the-network-management-toolkit.html

Page 88: Network Management

Comcast Cable Communications - Network management and peering

1 In 2010, Netflix signed an agreement with Level 3 Communications to carry its data

https://store.theartofservice.com/the-network-management-toolkit.html

Page 89: Network Management

Network management station

1 NMS is described in RFC 1157 A Simple Network Management Protocol.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 90: Network Management

Network management station

1 A NMS provides FCAPS functionality for the whole network. FCAPS: Fault,

Configuration, Accounting, Performance, Security, are the

categories defined by the ISO model. In non-billing organizations

accounting is sometimes replaced with administration.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 91: Network Management

Network management station

1 Looking into the industry aspects, there are various players in the

market like NokiaSiemens - NetAct, IBM - NetCool.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 92: Network Management

Network management station

1 Open source NMS solutions are also available like OpenNMS.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 93: Network Management

CANopen - Network management (NMT) protocols

1 The NMT protocols are used to issue state machine change commands

(e.g. to start and stop the devices), detect remote device bootups and

error conditions.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 94: Network Management

CANopen - Network management (NMT) protocols

1 The 'Module control protocol' is used by the NMT master to change the state of the devices. The CAN-frame COB-ID of this

protocol is always 0, meaning that it has a function code 0 and nodeID 0, which means that every node in the network will process this message. The actual nodeID, to which the command is meant to, is given in the

data part of the message. This can also be 0, meaning that all the devices on the bus

should go to the indicated state.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 95: Network Management

CANopen - Network management (NMT) protocols

1 The 'Heartbeat protocol' is used to monitor the nodes in the network and verify that they

are alive

https://store.theartofservice.com/the-network-management-toolkit.html

Page 96: Network Management

CANopen - Network management (NMT) protocols

1 This needs changing. The ID has to be 0 and the data field has to be 1 to

start the remote node, 80 to go to pre-operational, 2 to stop a remote node, 81 to reset a node and 82 to

reset the communication (all decimal)

https://store.theartofservice.com/the-network-management-toolkit.html

Page 97: Network Management

CANopen - Network management (NMT) protocols

1 CANopen devices are required to make the transition from the state

Initializing to Pre-operational automatically during bootup. When

this transition is made, a single heartbeat message is sent to the bus. This is the 'bootup protocol'.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 98: Network Management

CANopen - Network management (NMT) protocols

1 A response/reply-style (pull model) protocol, called node guarding, exists for follower

monitoring.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 99: Network Management

Network management systems - Internet server monitoring

1 Monitoring an internet server means that the server owner always knows if one or all of his services go down

https://store.theartofservice.com/the-network-management-toolkit.html

Page 100: Network Management

Network management systems - Internet server monitoring

1 External monitoring is more reliable, as it keeps on working when the

server completely goes down. Good server monitoring tools also have

performance benchmarking, alerting capabilities and the ability to link

certain thresholds with automated server jobs such as provisioning more memory or performing a

backup.https://store.theartofservice.com/the-network-management-toolkit.html

Page 101: Network Management

Aruba Networks - Network management

1 It includes three components to deliver the core capabilities for managing a network: operations

management with AirWave Management Platform (AMP), visualization and location

tracking with VisualRF, and rogue and intrusion detection with RAPIDS, AirWave's Rogue AP

Detection Software.[http://www.arubanetworks.com/produ

cts/management-security-software-2/airwave AirWave Network Management], visted 22 June

2012 AirWave is a multi-vendor multi-architecture tool

https://store.theartofservice.com/the-network-management-toolkit.html

Page 102: Network Management

Network management model

1 'FCAPS' is the International Organization for Standardization|ISO Telecommunications

Management Network model and framework for network management. FCAPS

is an acronym for fault, configuration, accounting, performance, security, the

management categories into which the ISO model defines network management tasks. In non-billing organizations accounting is sometimes replaced with administration.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 103: Network Management

Network management model - History

1 The idea of FCAPS turned out to be very useful for teaching network

management functions; most text books therefore start with a section

that explains the FCAPS.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 104: Network Management

Network management model - The five areas of function of the model

1 The OSI network management model categorizes five areas of function,

sometimes referred to as the FCAPS model: FCAPS can be seen as the

predecessor of the newer FAB model defined in ETOM. FAB is short for fulfillment, assurance, billing. As guideline, you can map the two

models as follows:

https://store.theartofservice.com/the-network-management-toolkit.html

Page 105: Network Management

Network management model - The five areas of function of the model

1 The FCAPS model can be seen as bottom-up or network-centric. The FAB model looks at the processes

more from top-down, is customer/business-centric. The two

standards that have emerged are Simple Network Management Protocol (SNMP) by IETF and

Common Management Information Protocol (CMIP) by ITU-T.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 106: Network Management

Network management model - Fault management

1 A fault is an event that has a negative significance. The goal of fault management is to recognize, isolate, correct and log faults that occur in the Telecommunications network|network. Furthermore, it

uses trend analysis to predict errors so that the network is always

available. This can be established by monitoring different things for

abnormal behavior.https://store.theartofservice.com/the-network-management-toolkit.html

Page 107: Network Management

Network management model - Fault management

1 When a fault or event occurs, a network component will often send a notification to

the network operator using either a proprietary or open Protocol (computing)|

protocol such as Simple Network Management Protocol|SNMP (such as HP OpenView or Sun Solstice–formerly Net Manager), to collect information about

network devices or at least write a message to its console for a console server to catch

and log/pagehttps://store.theartofservice.com/the-network-management-toolkit.html

Page 108: Network Management

Network management model - Fault management

1 Fault logs are one input used to compile statistics to determine the provided service level of individual network elements, as well as sub-

networks or the whole network. They are also used to determine apparently fragile network

components that require further attention. Errors primarily occur in the areas of fault management and

configuration management.https://store.theartofservice.com/the-network-management-toolkit.html

Page 109: Network Management

Network management model - Fault management

1 The leading fault management systems are HP Automated Network Management [http://www8.hp.com/uk/en/software-

solutions/software.html?compURI=1174702], IBM Tivoli

[http://www-01.ibm.com/software/tivoli/products/netcool-omnibus/ Netcool/OMNIbus], EMC

Smarts, CA Spectrum, NetIQ, TTI Telecom Netrac, Objective Systems Integrators NETeXPERT, Centina systems|Centina

System's, Infosim, NetOmnia, etc

https://store.theartofservice.com/the-network-management-toolkit.html

Page 110: Network Management

Network management model - Configuration management

1 The goals of configuration management

include:

https://store.theartofservice.com/the-network-management-toolkit.html

Page 111: Network Management

Network management model - Configuration management

1 * to gather and store configurations from network devices (this can be done locally or

remotely).

https://store.theartofservice.com/the-network-management-toolkit.html

Page 112: Network Management

Network management model - Configuration management

1 * to simplify the configuration of the device

https://store.theartofservice.com/the-network-management-toolkit.html

Page 113: Network Management

Network management model - Configuration management

1 * to track changes that are made to the configuration

https://store.theartofservice.com/the-network-management-toolkit.html

Page 114: Network Management

Network management model - Configuration management

1 * to configure ('provision') circuits or paths through non-

switched networks

https://store.theartofservice.com/the-network-management-toolkit.html

Page 115: Network Management

Network management model - Configuration management

1 * to plan for future expansion and scaling

https://store.theartofservice.com/the-network-management-toolkit.html

Page 116: Network Management

Network management model - Configuration management

1 Configuration management is concerned with monitoring system configuration information, and any

changes that take place

https://store.theartofservice.com/the-network-management-toolkit.html

Page 117: Network Management

Network management model - Accounting management

1 The goal is to gather usage statistics for

users.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 118: Network Management

Network management model - Accounting management

1 Accounting management is concerned with tracking network utilization information, such that individual users, departments, or

business units can be appropriately billed or charged for accounting

purposes

https://store.theartofservice.com/the-network-management-toolkit.html

Page 119: Network Management

Network management model - Accounting management

1 Accounting is often referred to as billing management. Using the

statistics, the users can be billed and usage quotas can be enforced. These can be disk usage, link

utilization, CPU time, etc.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 120: Network Management

Network management model - Accounting management

1 RADIUS, TACACS, and Diameter (protocol)|Diameter are examples of

protocols commonly used for accounting.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 121: Network Management

Network management model - Performance management

1 Network performance management|Performance management is focused

on ensuring that network performance remains at acceptable levels. It enables the manager to

prepare the network for the future, as well as to determine the efficiency of the current network, for example, in relation to the investments done

to set it up. The network performance addresses the

throughput, network response times, packet loss rates, link utilization, percentage utilization, error rates

and so forth.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 122: Network Management

Network management model - Performance management

1 Actively monitoring current network performance is an important step in

identifying problems before they occur, as part of a proactive network

management strategy

https://store.theartofservice.com/the-network-management-toolkit.html

Page 123: Network Management

Network management model - Security management

1 Security management is the process of controlling access to assets in the

network. Data security can be achieved mainly with authentication and encryption. Authorization to it

configured with Operating system|OS and Database management system|

DBMS access control settings.

https://store.theartofservice.com/the-network-management-toolkit.html

Page 124: Network Management

Network management model - Security management

1 Security management is not only concerned with ensuring that a

network environment is secure, but also that gathered security-related information is analyzed regularly

https://store.theartofservice.com/the-network-management-toolkit.html

Page 125: Network Management

Network management model - Notes

1 * [http://www.cisco.com/en/US/docs/internetworking/technology/handbook/

NM-Basics.html Cisco Network Management Basics]

https://store.theartofservice.com/the-network-management-toolkit.html

Page 126: Network Management

Network management model - Notes

1 * [http://standards.iso.org/ittf/PubliclyAvailableStandards/s014258_ISO_IEC_7498-4_1989(E).zip ISO/IEC 7498-4: Information processing systems -- Open Systems Interconnection -- Basic Reference Model -- Part 4:

Management framework]

https://store.theartofservice.com/the-network-management-toolkit.html