Business Data Communications, 4e 2
Network Management Requirements
Fault Management Accounting Management Configuration and Name Management Performance Management Security Management
Business Data Communications, 4e 3
Fault Management
A fault is an abnormal condition that requires management attention (or action) to repair
Fault is usually indicated by failure to operate correctly or by excessive errors
Users expect quick and reliable resolution
Business Data Communications, 4e 4
Responding to Faults
When faults occur, it is critical to quickly: Determine exactly where the fault is Isolate the rest of the network from the failure so that it
can continue to function without interference Reconfigure or modify the network to minimize the effect
of removing the failed component(s) Repair or replace the failed components to restore the
network to its initial state
Business Data Communications, 4e 5
Accounting Management Reasons for accounting management:
Internal chargebacks on network use User(s) may be abusing access privileges and burdening the
network at the expense of other users Users may be making inefficient use of the network, and the
network The network manager is in a better position to plan for
network growth if user activity is known in sufficient detail.
Business Data Communications, 4e 6
Configuration Management
Concerned with: initializing a network and grace-fully shutting down part
or all of the network maintaining, adding, and updating the relationships
among components and the status of components themselves during network operation
Business Data Communications, 4e 7
Performance Management Issues of concern to the network manager include:
What is the level of capacity utilization? Is there excessive traffic? Has throughput been reduced to unacceptable levels? Are there bottlenecks? Is response time increasing?
Network managers need performance statistics to help them plan, manage, and maintain large networks
Business Data Communications, 4e 8
Security Management
Concerned with generating, distributing, and storing encryption keys monitoring and controlling access to networks access to all or part of the network management
information collection, storage, and examination of audit records and
security logs
Business Data Communications, 4e 9
Network Management Systems
Collection of tools for network monitoring and control, integrated in these ways: A single user-friendly operator interface for performing
most or all network management tasks A minimal amount of separate equipment
consists of incremental hardware and software additions implemented among existing network components
Business Data Communications, 4e 11
Components of the NMS
All nodes run the Network Management Entity (NME) software
Network control host or manager runs the Network Management Application (NMA)
Other nodes are considered agents
Business Data Communications, 4e 12
Network Management Entity Collection of software contained in each network node,
devoted to the network management task Performs the following tasks:
Collect statistics on communications and network-related activities.
Store statistics locally Respond to commands from the network control center Send messages to NCC when local conditions undergo a
significant change
Business Data Communications, 4e 13
IBM Network Management Architecture and NetView
Associated with IBM’s Systems Network Architecture (SNA)
IBM wants to provide the single, unifying framework into which all other network management products feed and from which all the equipment in a user’s network can be controlled
Business Data Communications, 4e 14
Network Management Categories
SNA network management is composed of: Problem management Change management Configuration management Performance and accounting management
Business Data Communications, 4e 15
Problem Management
Problem determination Problem diagnosis Problem bypass and recovery Problem resolution Problem tracking and control
Business Data Communications, 4e 16
Change Management
Software change control Microcode change control Hardware change control
Business Data Communications, 4e 17
Configuration Management
Physical/logical resource identification Resource relationship identification
Business Data Communications, 4e 18
Performance & Accounting Management
Response-time monitoring Availability monitoring Utilization monitoring Component delay monitoring Performance tuning Performance tracking and control Accounting
Business Data Communications, 4e 19
NetView Software Control facility
Provides the capability to operate the network.
Hardware monitor collects notifications of failures or
significant events
Session monitor Collects session-related
information on logical components of the network; includes measurements of data on response time, session failure
Status monitor Displays status information;
reactivates network resources following failures
Help facilities Descriptions of fields on
displays, and a systematic problem-solving facility
Customization facilities: Permits a user to tailor NetView
Business Data Communications, 4e 20
Technical Control Automatic and remote testing and monitoring of the
system, to reduce downtime due to the need to locate service personnel
Restoring and/or reconfiguring the system upon failure in real time
Providing network performance and functioning statistics to facilitate planning and management for high availability
Business Data Communications, 4e 21
Component-Level Technical Control
Line Monitors Captures the signal between a host system and the
network Generally employed only on the network end
Protocol Analyzers Can also simulate various network components Can test communication protocols and codes Typically handles up to layer 3 of the OSI architecture
Business Data Communications, 4e 22
Network Technical Control Systems Integrate control devices and centralize the control of the network
Business Data Communications, 4e 23
Performance Monitoring
After availability, the second most important characteristic of a network is performance
Performance data must be available in sufficient detail to be able to assess the bottleneck that is causing the problem and to plan appropriate remedial action
Business Data Communications, 4e 24
Component-Level Monitoring Response-time monitors
Measures, displays, and records response time of each transaction and the average response time
Hardware monitors Events: Number of occurrences of specific events Timing: Timing the duration of a specific signal
Software monitors Gathers and reports statistics on hardware and systems and
applications software activity
Business Data Communications, 4e 26
Indicators Reported by Network Monitors
Service Parameters Availability Response Time Accuracy and Integrity
Efficiency Parameters Througput Polling Utilization
Business Data Communications, 4e 27
Simple Network ManagementProtocol (SNMP)
Network Management Model Management station Management agent Management information base Network management protocol
Business Data Communications, 4e 29
Protocol Specification
Transmission of a message Receipt of a message Variable bindings
Business Data Communications, 4e 30
SNMPv2
Released in 1992, revised in 1996 Addressed functional deficiencies in SNMP Accommodates decentralized network management Improves efficiency of data transfer
Business Data Communications, 4e 31
SNMPv3
Released in 1998, addressed security deficiencies in SNMP and SNMPv2
Does not provide a complete SNMP capability; defines an overall SNMP architecture and a set of security capabilities for use with SNMPv2
Provides three important services: authentication, privacy, and access control
Top Related