NETWORK MANAGEMENT Course Supervisor MUHAMMAD KHALID KHAN.

Post on 30-Dec-2015

219 views 4 download

Tags:

Transcript of NETWORK MANAGEMENT Course Supervisor MUHAMMAD KHALID KHAN.

NETWORK MANAGEMENT

Course Supervisor

MUHAMMAD KHALID KHAN

Do you really want good marks?

• Invest at-least 200 hours on this course. Any thing less may result in some thing that most probably you would not LIKE.

• 120 hours for the course-work and 80 hours for the project.

Course Material

Books: Network Management, Principles and Practices By Mani Sobramanian

Reference Books:Network Management, A Practical PerspectiveBy Allan Leinwend and Karen Fang

SNMP, SNMPv2 and CMIP, The Practical Guide toNetwork Management Standards By William Stallings

Marks Distribution

• Hourly: 30 (n-1)

• Sessional: 30 – Project: 15– Quizzes: 10– Assignment: 5

• Final: 40

ANY QUESTION

Telephone Network

• Characteristics:– Reliable - does what is expected of it– Dependable - always there when you need

it. (remember 911?)– Good quality (connection) - hearing each

other well

• Reasons:– Good planning, design, and implementation– Good operation and management of

network

Regional CenterClass 1 switch

Sectional CenterClass 2 switch

Primary CenterClass 3 switch

Toll CenterClass 4 switch

End OfficeClass 5 switch

Regional CenterClass 1 switch

Sectional CenterClass 2 switch

Primary CenterClass 3 switch

Toll CenterClass 4 switch

End OfficeClass 5 switch

Voice Voice

To otherRegional centersSectional centersPrimary centersToll centersEnd offices

To otherPrimary centersToll centersEnd offices

To otherClass 4 toll pointsEnd offices

Figure 1.1 Telephone Network Model

Legend:Loop

Direct Trunk

Toll-Connecting Trunk

Toll Trunk

Telephone Network Model

• Notice the hierarchy of switches

• Primary and secondary routes programmed

• Automatic routing

• Where is the most likely failure?

• Use of Operations Systems to ensure QoS

Telephone Network

• Monitor telephone network parameters– S/N ratio, transmission loss, call blockage, etc.

• Real-time management of network• Trunk (logical entity between switches) maintenance

system measures loss and S/N. Trunks not meeting QoS are removed before customer notices poor quality

• Traffic measurement systems measure call blockage. Additional switch planned to keep the call blockage below acceptable level

• Operations systems are distributed at central offices• Network management done centrally from Network

Operations Center (NOC)

Operations Systems / NOC

Data and Telecommunication Network

Terminal

Modem

Voice

Terminal

Modem Modem

Voice

Host

Data communication network

Telecommunication network

Figure 1.3 Data and Telecommunication Networks

Loop Loop Loop

• Computer data is carried over long distance by telephone (telecommunication network)

• Output of telephone is analog and output of computers is digital

• Modem is used to “modulate” and “demodulate” computer data to analog format and back

• Clear distinction between the two networks is getting fuzzier with modern multimedia networks

Data and Telecommunication Network

Mainframe

Communicationscontroller

Communicationscontroller

Clustercontroller

Clustercontroller

Figure 1.5 IBM Systems Network Architecture Model

Workstation Workstation

IBM SNA Architecture

• IBM System Network Architecture (SNA) is a major step in network architecture

• SNA is based on multitude of (dumb) terminals accessing a mainframe host at a remote location

IBM SNA Architecture

DCE with LAN

Ethernet

Workstation

Workstation

Host

Host

Workstation

(a) Hosts and Workstations on Local LAN

DCE.. Distributed Computing Environment

• Driving technologies for DCE:– Desktop processor– LAN– LAN - WAN network

DCE with LAN

LAN-WAN network

LAN A LAN B

LAN C

Bridge /Router

Bridge /Router

Bridge /Router

WANcommunication link

LAN-WAN network

• Major impacts of DCE:– No more monopolistic service provider– No centralized IT controller– Hosts doing specialized function– Client/Server architecture formed the core

of DCE network

Client/Server Model

• Post-office analogy; clerk the server, and the customer the client

• Client always initiates requests

• Server always responds

• Notice that control is handed over to the receiving entity.

Client/Server Examples

Client/Server Examples

TCP/IP Based Networks

• TCP/IP is a suite of protocols• Internet is based on TCP/IP• IP is Internet protocol at the network layer level• TCP is connection-oriented transport protocol

and ensures end-to-end connection• UDP is connectionless transport protocol and

provides datagram service• Internet e-mail and much of the network mgmt.

messages are based on UDP/IP• ICMP component (used in ping) of TCP/IP suite

Architecture, Protocols and Standards

• Communication architecture– Modeling of communication systems, comprising

• functional components and• operations interfaces between them

• Communication protocols– Operational procedures

• intra- and inter-modules

• Communication standards– Agreement between manufacturers on protocols

of communication equipment on• physical characteristics and • operational procedures

Communication Architecture

Communication Architecture

Communication Architecture

• Inter-layer interface: user and service provider

• Peer-layer protocol interface

• Analogy of hearing-impaired student

• Role of intermediate systems

• Gateway: Router with protocol conversion as gateway to an autonomous network or subnet

OSI Reference Model

OSI Reference Model

OSI Reference Model

PDU Communication Model

Network Management

• Network management is the process of controlling a complex data network to maximize its efficiency and productivity

• The overall goal of network management is to help with the complexity of a data network and to ensure that data can go across it with maximum efficiency and transparency to the users

Network Management and it’s Functional Grouping

Network Network Network

ProvisioningOperation Maintenance

Planning Fault Management Network Installation

Design Configuration Management Network Repairs

Performance Management Network Test

Security Management Trouble-shooting

Accounting Management

Typical Network Management System

Network Management Objectives

At first glance and without starting a complex research, asnetwork end-users, it is obvious that we expect fast, secureand reliable connections, as network manager we wouldlike to easily configure and control network access andresources, and as corporate manager we expect a lowusage cost.

• Controlling Corporate strategic assets: Networks and distributed computing resources are increasingly vital resources for most organizations. Without effective control, these resources do not provide the pay-back that corporate management requires.

Network Management Objectives

• Controlling complexity: The continued growth in the number of network components, end users, interfaces, protocols, and vendors threatens management with loss of control over what is connected to the network and how network resources are used.

• Improving services: End users expect the same or improved service as the information and computing resources of the organization grow and distribute.

Network Management Objectives • Balancing various needs: The information and

computing resources of an organization must provide a spectrum of end users with various applications at given levels of support, with specific requirements in the areas of performance, availability, and security. The network manager must assign and control resources to balance these various needs.

• Reducing down-time: As the network resources of an organization become more important, minimum availability requirement approach 100 percent. In addition to proper redundant design, network management has an indispensable role to play in ensuring high availability of its resources.

• Controlling costs: Resource utilization must be monitored and controlled to enable essential end-user needs to be satisfied with reasonable cost.

Network Management

• The International Organization for Standardization (ISO) Network Management Forum divided network management into five functional areas:– Fault Management– Configuration Management– Security Management– Performance Management– Accounting Management

Fault Management

• Is the process of locating problems, or faults, on the data network

• It involves the following steps:– Discover the problem– Isolate the problem– Fix the problem (if possible)

Configuration Management

• The configuration of certain network devices controls the behavior of the data network

• Configuration management is the process of finding and setting up (configuring) these critical devices

Security Management

• Is the process of controlling access to information on the data network

• Provides a way to monitor access points and records information on a periodic basis

• Provides audit trails and sounds alarms for security breaches

Performance Management

• Involves measuring the performance of the network hardware, software, and media

• Examples of measured activities are:– Overall throughput– Percentage utilization– Error rates– Response time

Accounting Management

• Involves tracking individual’s utilization and grouping of network resources to ensure that users have sufficient resources

• Involves granting or removing permission for access to the network

Network Management Protocols

• A simple protocol defines common data formats and parameters and allows for easy retrieval of information

• A complex protocol adds some change capability and security

• An advanced protocol remotely executes network management tasks

Network Management Protocols

• So where is technology today?– The most common protocols are:

• SNMP (Simple Network Management Protocol) • SNMPv2 (SNMP version 2) • CMIS/CMIP (Common Management Information

Services/Common Management Information Protocol)

• RMON (Remote Monitoring)

Network Management Protocols

• SNMP is beyond the simple protocol with adequate monitoring capabilities and some change capabilities

• SNMPv2 greatly enhances the SNMP feature set

• CMIP approaches the advanced tool, but implementation issues have limited its use

Network Management Protocols

• These protocols do not state how to accomplish the goals of network management

• They give methods to monitor and configure network devices

• The challenge to analyze the information in an effective manner rests with software engineers who write network management applications

Network Management Platform

• Historically, network management revolved around multiple systems, each managing one specific set of components on the data network

• Restrictions of money, physical space, and technical expertise led to the desire to have the components managed by a single system that would show their interconnections on a network map

Network Management Platform

• A network management platform is a software package that provides the basic functionality of network management for different network components

• The goal for the platform is to provide generic functionality for managing a variety of network devices

Network Management Platform

• Basic features for any platform to include are:– Graphical User Interface (GUI)– Network Map– Database Management System (DBMS)– Standard Method to Query Devices– Customizable Menu System– Event Log

Network Management Platform

• Additional features for a platform include:– Graphing Tools– Application Programming Interface (API)– System Security

Network Management Platform

• Management Platforms that exist today– Sun’s SunNet Manager– HP’s OpenView– IBM’s Netview for AIX– Cabletron’s Spectrum

Network Management Architectures

• The Network Management Platform can use various architectures to provide functionality

• The 3 most common are:– Centralized– Hierarchical– Distributed

Centralized Architecture

• The Network Management Platform resides on a single computer system

• For full redundancy, the computer system is backed up by another system

• Can allow access and forward events to other consoles on network

Centralized Architecture

Centralized Architecture

• Pros:– Single location to view events & alerts– Single place to access network management

applications and information– Security is easier to maintain

Centralized Architecture

• Cons:– Single system is not redundant or fault

tolerant– As network elements are added, may be

difficult or expensive to scale system to handle load

– Having to query all devices from a single location

Hierarchical Architecture

• Uses multiple computer systems– One system acting as the central server– Other systems working as clients

• Central server requires backups for redundancy

Hierarchical Architecture

Hierarchical Architecture

• Key features:– Not dependent on a single system– Distribution of network management tasks– Network monitoring distributed throughout

network– Centralized information storage

Hierarchical Architecture

• Pros:– Multiple systems to manage the network

• Cons:– Information gathering is more difficult and time

consuming– The list of managed devices managed by

each client needs to be predetermined and manually configured

Distributed Architecture

• Combines the centralized and hierarchical architectures

• Uses multiple peer network management systems– Each peer can have a complete database – Each peer can perform various tasks and

report back to a central system

Distributed Architecture

Distributed Architecture

• Contains advantages from central & hierarchical architectures– Single location for all network information, alerts

& events– Single location to access all management

applications– Not dependent on a single system– Distribution of network management tasks– Distribution of network monitoring throughout the

network

Other Topics

• Sniffers

• RMON

• Network Statistics