Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer...

33
Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University

Transcript of Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer...

Page 1: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Network Management

2110472 Computer Networks

Natawut Nupairoj, Ph.D.

Department of Computer Engineering

Chulalongkorn University

Page 2: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Outline

Introduction to Network Management. Overview. Sample Applications.

Simple Network Management Protocol. History of SNMP. Basic SNMP Concepts. MIB Standards. SNMPv3.

ASN.1.

Page 3: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Overview

Typical System Administrator’s Life Manage many hosts and network devices. Detect and response to the PROBLEMS.

Administrators should know the problems BEFORE the users.

Must promise for some Service Level Agreement (SLA) levels System availability. Response time. Throughput.

Page 4: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Overview

What is the scope of network management ? Monitor for problems

Hosts and services. Levels of status: up, minor, major, critical. To reach SLA.

Monitor for tune-up Should we add more network bandwidth ? For how

much ? Detect the intrusion

Intrusion detection against the hackers.

Page 5: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Overview

Why is it so hard ? SLA is usually difficult to achieve without good

planning and tools Availability (uptime) – Five Nines = 99.999% Thus, each host can be down only for

1 Year = 365 * 24 * 60 = 525,600 minutes. 0.001% (acceptable downtime) of 1 Year = 5.256 minutes.

This includes maintenance period !!! How about Six Nines ???

There are MANY…MANY devices.

Page 6: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Page 7: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

System Reliability

Cause of downtime (by Gartner Group)

Page 8: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Sample Network Monitoring Applications

There are several network management applications OS Tools

Ping, tracerout, netstat, etc. Freewares

Netsaint, MRTG, snort, etc. Commercial

CA Unicenter, HP Openview, IBM Trivoli, CiscoWorks.

Page 9: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Page 10: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Page 11: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Page 12: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Page 13: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

SNMP

Simple Network Management Protocol.

1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999

pro

pos

ed

s ta

nd

ard

imp

lem

enta

t ion

e xpe

r ien

ce

SGMP SNMPSNMP

SMPSNMPv2(parties)security

SNMPv2(community) SNMPv3

dr a

fts t

an

dar

d

full

s ta

nd

ard

dr a

fts t

an

dar

d

pro

pos

ed

s ta

nd

ard

dr a

fts t

an

dar

d

Page 14: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Basic SNMP Concepts

MANAGER

AGENTS

SNMP

MIB

Page 15: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Operational Modes

MANAGER

AGENTS

TRAPS

POLLING

MIB

Page 16: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

SNMP StructureMANAGER AGENT

CONNECTIONLESS TRANSPORT SERVICE PROVIDER

SNMP PDUs

UDP

Management ApplicationMIB

Page 17: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

SNMP Frameworks – MIB

Management Information Base MIB Objects

Variables that represent the resources of the system. Can have several types of values.

MANAGER AGENT

SNMP

address

name

uptime

Page 18: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

SNMP Frameworks - MIB

Structure of Management Information (SMI) Define a standard way to reference the information. Describe what includes / what not for each device.

NEW-MIB:

address (1) info (2)

name (1) uptime (2)

1

130.89.16.2

printer-1 123456

Page 19: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

SMI - Example address

Object ID = 1.1 Value of Instance = 130.89.16.2

info Object ID = 1.2

name Object ID = 1.2.1 Value of Instance = printer-1

uptime Object ID = 1.2.2 Value of Instance = 123456

ALTERNATIVE: Object ID = NEW-MIB info

uptime

NEW-MIB:

address (1) info (2)

name (1) uptime (2)

1

130.89.16.2

printer-1 123456

Page 20: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

Standard SMIroot

ccitt (0) iso (1) joint-iso-ccitt (2)

stnd (0) reg-auth (1) mb (2) org (3)

dod (6)

internet (1)

security (5)mngt (2) experimental (3) private (4)

mib-2 (1)

directory (1) snmpV2 (6)

enterprises (1)

snmpDomains (1)

snmpProxys (2)

snmpModules (3)

Page 21: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

MIB-II – Internet MIB

...

root

ccitt (0) iso (1) joint-iso-ccitt (2)

stnd (0) reg-auth (1) mb (2) org (3)

dod (6)

internet (1)

directory (1) mngt (2) experimental (3) private (4)

mib-2 (1)

system (1) interfaces (2) ... transmission (10) snmp (11) ospf (14) bgp (15)

ethernet (6) token ring (9) fddi (15) adsl (94)

...

...

security (5) snmpV2 (6)

Page 22: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

MIB ExampleHost Resources MIB

MIB-2

host (25)

hrSystem (1)

hrStorage (2)

hrDevice (3)

hrSWRun (4)

hrSWRunPerf (5)

hrSWInstalled (6)

hrMIBAdminInfo (7)

hrSystemUptime (1)

hrSystemdate (2)

hrSystemInitialLoadDevice (3)

hrSystemInitialLoadParameters (4)

hrSystemNumUsers (5)

hrSystemProcesses (6)

hrSystemMaxProcesses (7)

Page 23: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

SNMP Operations

getNext

response

MIB

manager agent

set

response

MIB

manager agent

get

response

MIB

manager agent

trap

manager agent

Page 24: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

PDU Structure

NAME 1 VALUE 1 NAME 2 VALUE 2 ••• ••• NAME n VALUE n

PDU TYPE* ERROR

VARIABLE BINDINGSSTATUSREQUEST

IDERRORINDEX

VERSION COMMUNITY SNMP PDU

variable bindings:

SNMP PDU:

SNMP message:

Page 25: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

SNMPv3 – Security Enhancements

MIB

MANAGER

APPLICATION PROCESSES

TRANSPORT SERVICE

MANAGER AGENT

GET / GET-NEXT / GETBULKSET / TRAP / INFORM

SECURE COMMUNICATION

ACCESS CONTROL

Page 26: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

ASN.1

Abstract Syntax Notation 1 Similar to BNF notation for programming

language. Define how data should be sent, in what order. The protocol designer must write ASN.1 to define

the protocol Programming language designer uses BNF to define

the grammar of the language. Encode in binary format.

Page 27: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

ASN.1 - Example

How can I send an integer 65534 ? 2 bytes: 1111 1111 1111 1110 Big-endian or little-endian ?

Sender uses little-endian, receiver uses big-endian. 1111 1110 1111 1111 = 65279

What if I want to send a whole structure ?struct {char code;int x;

}

Page 28: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

ASN.1 Syntax Definition

Define a data type Define based on built-in types and other data

types defined in the file. Built-in types: INTEGER, OCTET STRING,

REAL, BOOLEAN, etc. Newly-defined data type can be complicated

SEQUENCE, SEQUENCE OF, CHOICE, etc.

Format <name> ::= <description -- components>

Page 29: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

ASN.1 Examples

---- The currency codes from ISO 4217-- are used to identify a currency --Currency ::= OCTET STRINGObjectId ::= INTEGER

DateTime ::= SEQUENCE { timeOffsetCode TimeOffsetCode,

localTimeStamp LocalTimeStamp}

Page 30: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

ASN.1 Encoding Rules

Syntax definition defines the components of the data.

Encoding defines how to actually store the data.

Data can be encoded in several ways. Basic Encoding Rule (BER). Distinguished Encoding Rule (DER). Packed Encoding Rule (PER).

Page 31: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

BER Encoding

Basic Encoding Rule (BER) Tag Length Value (TLV).

TAG LENGTH VALUE

MyId ::= [APPLICATION 12] INTEGER

12 4 1234(this is not the actual encoded data.)

Page 32: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

BER Encoding

Constructed Encoded Form

T L T L T L V T L V

DateTime ::= [APPLICATION 83] SEQUENCE

{

timeOffsetCode TimeOffsetCode,

localTimeStamp LocalTimeStamp

}

TimeOffsetCode ::= [APPLICATION 232] Code

LocalTimeStamp ::= [APPLICATION 16] NumberString

Code ::= [APPLICATION 243] INTEGER

Page 33: Network Management 2110472 Computer Networks Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.

References J. Kurose and K. Ross, Computer Networking: A Top-Down

Approach Featuring the Internet, Addison Wesley, 2001. Netsaint, http://www.netsaint.org. The SimpleWeb Tutorials, http://www.simpleweb.org/tutorials/. Electronic and telecommunication Institute, Lessons about SNMP,

http://www.et.put.poznan.pl/snmp/main/mainmenu.html. Yoram Cohen, SNMP – Simple Network Management Protocol,

http://www.rad.com/networks/1995/snmp/snmp.htm.