Notes - Faculty Personal Homepage

advertisement
Chapter 3
Chapter 3
Basic Foundations:
Standards, Models, and Language
And
Chapter 13
Network Management Applications
Network Management: Principles and Practice
© Mani Subramanian 2000
1
Chapter 3
Introduction
• Standards
• Standards organizations
• Protocol standards of transport layers
• Protocol standards of management
(application) layer
• Management Models
• Language
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
2
Chapter 3
Table 3.1 Network Management Standards
Standard
OSI / CMIP
Salient Points
 International standard (ISO / OSI)
(Common
 Management of data communications network - LAN and WAN
Management  Deals with all 7 OSI layers
Information
 Most complete
Protocol)
 Object oriented – classes, inheritance
 Well structured and layered
 Consumes large resource in implementation – complex
SNMP /
Internet
 Industry standard (IETF)
TMN
 International standard (ITU-T)
 Originally intended for management of Internet components,
(Simple
currently adopted for WAN and telecommunication systems
Network
 Easy to implement – uses scalar objects
Management
 Most widely implemented
Protocol)
(Telecom
 Management of telecommunications network – service
Management
providers
Network)
 Based on OSI network management framework
 Addresses both network and administrative aspects of
management – Service and Business Management
IEEE
 IEEE standards adopted internationally
 Addresses LAN and MAN management
 Adopts OSI standards significantly
 Deals with first two layers of OSI RM – Physical and Data Link
Web-based
 Web-Based Enterprise Management (WBEM) – spec by DMTF
Management  Java Management Extensions (JMX) – called earlier JMAPI
Network Management: Principles and Practice
© Mani Subramanian 2000
3
Chapter 3
OSI NM Architecture and Model
Network
Mangement
Organization
Model
Information
Model
Communication
Model
Functional
Model
Figure 3.1 OSl Network Management Model
Notes
• Organization model
• Network management components
• object, agent, and manager
• Functions of components
• Relationships
• Information model
• Structure of management information (SMI)
• Syntax and semantics
• Management information base (MIB)
• Organization of management information
• Object-oriented
Network Management: Principles and Practice
© Mani Subramanian 2000
4
Chapter 3
OSI NM Architecture and Model
Network
Mangement
Organization
Model
Information
Model
Communication
Model
Functional
Model
Figure 3.1 OSl Network Management Model
Notes
• Communication model
• Transfer syntax with bi-directional messages
• M-SET, M-GET
• Transfer structure (PDU)
• Functional model – User oriented requirements of NM
• Application functions (Covered in chapter 13)
• Configure components (CM)
• Monitor components (FM)
• Measure performance (PM)
• Secure information (SM)
• Usage accounting (AM)
Network Management: Principles and Practice
© Mani Subramanian 2000
5
Chapter 3
SNMP Architecture and Model
(Not defined explicitly)
Network
Mangement
Organization
Model
Information
Model
Communication
Model
Functional
Model
Figure 3.1 OSl Network Management Model
Notes
• Organization model
• Same as OSI model
• Information model
• Same as OSI, but scalar
•Communication model
• Messages less complex than OSI
and unidirectional (request, response)
• Transfer structure (PDU)
• Functional model
• Application functions in terms of
• Operations (get, set)
• Administration – who has access to what
• Security – community-based
Network Management: Principles and Practice
© Mani Subramanian 2000
6
Chapter 3
TMN Architecture
• Addresses management of telecommunication
networks
• Based on OSI model
• Superstructure on OSI network
• Addresses network, service, and business
management
• See chapter 11 for more details
Business Management
q3
Service Management
q3
Network Management
q3
Element Management
q3
Managed Network Element
Figure 11.11 TMN Service Architecture
Network Management: Principles and Practice
© Mani Subramanian 2000
7
Chapter 11
Example (NMF)
TMN Logical
Layered Architecture
Business
Management
q3
Ref. Point
Service
Management
q3
Ref. Point
Network
Management
q3
Ref. Point
Element
Management
Physical Realization of
TMN Architecture
Customer
Service
Management
Q3
Service
Details
Service Mgmt
Tarif/Charging
Service Mgmt
Provisioning
Service
Configuration
Net Mgmt
Routing Admin
Equipment
Configuration
Net Element
Cust Admin
Q3
Performance and
Billing Data
Service Mgmt
Other
Serviceimpacting
Events
Net Mgmt
Traffic Admin
Q3
Net Mgmt
Restoration
Equipment
Alarms
Net Element
Switch Mgmt
Net Element
Trans Eqpt
Mgmt
Figure 11.14 TMN Realization Example (NMF)
Network Management: Principles and Practice
© Mani Subramanian 2000
8
Chapter 3
Organization Model
• Manager
• Manages the managed elements
• Sends requests to agents, retrieves
management information & stores it in MDB
• Monitors alarms – unsolicited
traps/notifications from agents
• Houses applications, e.g., CM, FM, etc.
• Provides user interface, e.g., HPOpenview
• Agent
• Gathers information from objects – get
• Configures parameters of objects – set
• Responds to managers’ requests –
response
• Generates alarms and sends them to
managers (unsolicited) – trap
• Managed object
• Network element that is managed, e.g.,
hubs, bridges, etc.
• Houses management agent – process
running
• All objects are either not managed or
manageable (more expensive)
Network Management: Principles and Practice
© Mani Subramanian 2000
9
Chapter 3
Two-Tier Model
MDB
Manager
Managed objects
Unmanaged objects
MDB Management Database
Agent process
Figure 3.2 Two-Tier Network Mangement Organization Model
Notes
• Agent built into network element
Example: Managed hub, managed router
• A manager can manage multiple elements
Example: Switched hub, ATM switch
• MDB is a physical database
• Unmanaged objects are network elements
that are not managed - both physical (unmanaged
hub) and logical (passive elements)
Network Management: Principles and Practice
© Mani Subramanian 2000
10
Chapter 3
Three-Tier Model
MDB
Manager
MDB
Agent / Manager
Managed objects
MDB Management Database
Agent process
Figure 3.3 Three-Tier Network Mangement Organization Model
Notes
• Middle layer plays the dual role
• Agent to the top-level manager
• Manager to the managed objects - e.g., collects data
• Example of middle level: Remote monitoring
agent (RMON)
• Examples:
• Statistical measurement on a network
• Local site passes information to a remote site
Network Management: Principles and Practice
© Mani Subramanian 2000
11
Chapter 3
Manager of Managers
MoM
Agent
Agent NMS
Manager
MDB
Agent
Agent NMS
MDB
Manager
MDB
Managed objects
Managed objects
Agent NMS
MoM Manager of Managers
MDB Management Database
Agent
Manager
Agent process
Figure 3.4 Network Mangement Organization Model with MoM
Notes
• Agent NMS manages the domain
• MoM presents integrated view of domains
• Domain may be geographical (cities), administrative
(departments), vendor-specific products (Cisco), etc.
Network Management: Principles and Practice
© Mani Subramanian 2000
12
Chapter 3
Peer NMSs
Agent NMS
Manager NMS
Manager NMS
Agent NMS
Figure 3.5 Dual Role of Management Process
Notes
• NMSs configured in a peer-to-peer relationship
• Network management system acts as peers
• Dual role of both NMSs
• Example: Two network service providers exchange
Management information
• Dumbbell architecture discussed in Chapter 1
• Notice that the manager and agent functions are
processes and not systems
Network Management: Principles and Practice
© Mani Subramanian 2000
13
Chapter 1
Interoperability
NMS
Vendor A
Messages
Services & Protocols
NMS
Vendor B
Network
Agent
Network
Agent
Network
Agent
Network
Agent
Network
Objects
Network
Objects
Network
Objects
Network
Objects
Application
Services
Objects
Objects
Vendor A
Management
Protocol
Vendor B
Objects
Objects
Transport
Protocols
(b) Services and Protocols
Figure 1.23 Network Management Dumbbell Architecture
Notes
• Message exchange between NMSs managing
different domains
Network Management: Principles and Practice
© Mani Subramanian 2000
14
Chapter 3
Information Model:
Analogy
• Information model – Structure & storage of information
• Figure in a book uniquely identified by
• ISBN, Chapter, and Figure number in that
hierarchical order
• ID: {ISBN, chapter, figure} – Hierarchy of designation
• The three elements above define the syntax – format
• Semantics is the meaning of the three
entities according to Webster’s dictionary
• The information comprises syntax and semantics
about an object
Notes
• Management information model =
objects representation (SMI) +
management information of objects (MIB)
• SMI defines the syntax & semantics of management
information stored in the MIB
• Information model specifies the information base to
describe managed objects and their relationships
(i.e., MIB)
Network Management: Principles and Practice
© Mani Subramanian 2000
15
Chapter 3
Structure of Management Information
(SMI)
• SMI defines for a managed object:
• Syntax
• Semantics – i.e., definition
• plus additional information such as status
• Example
sysDescr:
{ system 1 }
Syntax:
OCTET STRING
Definition: "A textual description of the entity. "
Access:
read-only
Status:
mandatory
Notes
• Uses ASN.1: Abstract Syntax Notation One
• See RFC 1155:
• Section 4. Managed objects
• Section 4.3. Macros
Network Management: Principles and Practice
© Mani Subramanian 2000
16
Chapter 3
Management Information Base (MIB)
• Used by manager & agents to store & exchange
management information
• Information base contains information about objects
• Organized by grouping of related objects (e.g., IP group)
• Defines relationship between objects (e.g., object system
is a parent of object sysDescr)
• It is NOT a physical database. It is a virtual
database that is compiled into management module
Notes
• The agent MIB is used for accessing local information
requested by the manager, and sending a response back
• The manager MIB is used for accessing information
on all network components the manager manages.
• See RFC 1213
Network Management: Principles and Practice
© Mani Subramanian 2000
17
Chapter 3
Information Base View: An Analogy
• Fulton County library system has many branches
• Each branch has a set of books
• The books in each branch is a different set
• The information base of the county has the
view (catalog) of all books
• The information base of each branch has the
catalog of books that belong to that branch.
That is, each branch has its view (catalog) of
the information base
• Let us apply this to MIB view
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
18
Chapter 3
MIB View and Access of an Object
• A managed object has many attributes - its
information base (e.g., IPAddress, # of ports)
• There are several operations that can be
performed on the objects (get, set)
• A user (manager) can view and perform only
certain operations on the object by invoking
the management agent – privileges depends on
the user and the managed object
• The view of the object attributes that the agent
perceives is the MIB view
• The operation that a user can perform is the
MIB access
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
19
Chapter 3
Management Data Base / Information Base
Manager
MDB
MIB
MDB Management Database
MIB Management Information Base
Agent process
Managed objects
Figure 3.6 Network Configuration with Data and Information Base
Notes
• Distinction between MDB and MIB
• MDB physical database; e.g.. Oracle, Sybase
• MIB virtual database; schema compiled into
management software (for processes to
exchange information)
• An NMS can automatically discover a managed
object, such as a hub, when added to the network
• The NMS can identify the new object as hub only
after the MIB schema of the hub is compiled into
NMS software
Network Management: Principles and Practice
© Mani Subramanian 2000
20
Chapter 3
Managed Object
• Managed objects can be
• Network elements (hardware, system)
• hubs, bridges, routers, transmission facilities
• Software (non-physical)
• programs, algorithms
• Administrative information
• contact person, name of group of objects
(IP group)
Notes
• In fact, any type of info that can be included in the
MIB can be managed.
Network Management: Principles and Practice
© Mani Subramanian 2000
21
Chapter 3
Management Information Tree
Root
Level 1
Level 2
Level 3
Figure 3.7 Generic Representation of Management Information Tree
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
22
Chapter 3
OSI Management Information Tree
itu
0
iso
1
iso-itu
2
org
3
dod
6
internet
1
Figure 3.8 OSI Management Information Tree
Notes
• iso
International Standards Organization
itu
International Telecommunications Union
dod Department of Defense
• Designation:
• iso
1
• org
1.3
• dod
1.3.6
• internet 1.3.6.1 – all internet managed
objects will start with this
Network Management: Principles and Practice
© Mani Subramanian 2000
23
Chapter 3
Object Type and Instance
• Type
• Name
• Syntax
• Definition
• Status
• Access
• Instance
Notes
• Example of a circle
• “circle” is syntax
• Semantics is definition from dictionary
“A plane figure bounded by a single curved
line, every point of which is of equal distance
from the center of the figure.”
• Analogy of nursery school
Network Management: Principles and Practice
© Mani Subramanian 2000
24
Chapter 3
Managed Object:
Internet Perspective
Access:
Access
privilege
Object Type:
Object ID and
Descriptor
circle
Status:
Implementaion
requirements
Syntax :
model of object
Defintion:
Semantics textual description
Figure 3.9(a) Internet Perspective
Notes
object ID
unique ID
and descriptor
syntax
and name for the object
used to model the object
access
access privilege to a managed object
status
implementation requirements
definition
textual description of the semantics
of object type
Network Management: Principles and Practice
© Mani Subramanian 2000
25
Chapter 3
Managed Object:
OSI Perspective
Object Class:
Circular
object
Behaviour
Object Class:
Elliptical
object
Notifications :
Notify changes in
attribute values
Operations:
Push
Attributes :
circle, dimension
Attributes:
ellipse, dimension
Figure 3.9(b) OSI Perspective
Notes
object class
managed object
attributes
attributes visible at its boundary
operations
operations which may be applied to it
behaviour
behaviour exhibited by it in response to operation
notifications
notifications emitted by the object
Network Management: Principles and Practice
© Mani Subramanian 2000
26
Chapter 3
Packet Counter Example
Characteristics
Example
Object type
PktCounter
Syntax
Counter
Access
Read-only
Status
Mandatory
Description
Counts number of packets
Figure 3.10(a) Internet Perspective
Characteristics
Example
Object class
Packet Counter
Attributes
Single-valued
Operations
get, set
Behavior
Retrieves or resets values
Notifications
Generates notifications on new
value
Figure 3.10 (b) OSI Perspective
Figure 3.10 Packet Counter As Example of Managed Object
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
27
Chapter 3
Internet Vs OSI Managed Object
• Scalar object in Internet vs. Object-Oriented
approach in OSI
• OSI characteristics of operations, behavior, and
notification are part of communication model in
Internet: get/set and response/alarm
• Internet syntax is absorbed as part of OSI attributes
• Internet access is part of OSI security model
• Internet status is part of OSI conformance application
• OSI permits creation and deletion of objects;
Internet does not. However, enhancement in SNMPv2
include:
• Defining new data types
• Adding or deleting conceptual rows in tables
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
28
Chapter 3
Mgmt. Communication Model
Operations /
Requests
Manager
Applications
Responses
Agent
Notifications /
Traps
Network Elements /
Managed Objects
Figure 3.11 Management Message Communication Model
Notes
• In Internet requests/responses, in OSI operations
• In Internet traps and notifications (SNMPv2),
in OSI notifications
Network Management: Principles and Practice
© Mani Subramanian 2000
29
Chapter 3
Transfer Protocols
Manager
Applications
Operations / Requests / Responses
Traps / Notifications
Agent
Applications
Manager
Communication
Module
SNMP (Internet)
CMIP (OSI)
Agent
Communication
Module
Transport Layers
UDP / IP (Internet)
OSI Lower Layer Profiles (OSI)
Transport Layers
Physical Medium
Figure 3.12 Management Communication Transfer Protocols
Notes
• Internet is based on SNMP; OSI is based on CMIP
• OSI uses CMISE (Common Management Information
Service Element) application with CMIP
• OSI specifies both c-o and connectionless transport
protocol; SNMPv2 extended to c-o, but rarely used
Network Management: Principles and Practice
© Mani Subramanian 2000
30
Chapter 3
Abstract Syntax Notation One
• ASN.1 is more than a syntax; it’s a formal language
• Addresses both syntax and semantics
• Two type of syntax
• Abstract syntax: set of rules that specify
data type and structure for information storage
• Transfer syntax: set of rules for communicating
information between systems
• Makes application layer protocols independent
of lower layer protocols
• Can generate machine-readable code: Basic
Encoding Rules (BER) is used in management
modules
Notes
• ASN.1 developed jointly by ITU-T and ISO
• Abstract syntax → Information model
• Transfer syntax → communication model
Network Management: Principles and Practice
© Mani Subramanian 2000
31
Chapter 3
Backus-Nauer Form (BNF)
Definition:
<name> ::= <definition>
Rules:
<digit> ::= 0|1|2|3|4|5|6|7|8|9
<number> ::= <number> | <digit> <number>
<op> ::= +|-|x|/
<SAE> ::= <number>|<SAE>|<SAE><op><SAE>
Example:
• 9 is primitive 9
• 19 is construct of 1 and 9
• 619 is construct of 6 and 19
Notes
• BNF is used for ASN.1 constructs
• Constructs developed from primitives
• The above example illustrates how numbers
are constructed from the primitive <digit>
• Simple Arithmetic Expression entity (<SAE>) is
constructed from the primitives <digit> and
<op>
Network Management: Principles and Practice
© Mani Subramanian 2000
32
Chapter 3
Simple Arithmetic Expression
<SAE> ::= <number> | <SAE><op><number>
Example: 26 = 13 x 2
Constructs and primitives
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
33
Chapter 3
Type and Value
• Assignments
• <BooleanType> ::= BOOLEAN
• <BooleanValue> ::= TRUE | FALSE
• ASN.1 module is a group of assignments
person-name Person-Name::=
{
first
"John",
middle "I",
last
"Smith"
}
Notes
• Two basic parameters associated with
an entity (e.g., BOOLEAN)
• Data type
• Value (assigned to this data type)
• Keywords: entities with all capital letters
(e.g., TRUE)
Network Management: Principles and Practice
© Mani Subramanian 2000
34
Chapter 3
Data Type: Example 1
PersonnelRecord ::= SET
{
Name,
title
GraphicString,
division CHOICE {
marketing
[0] SEQUENCE
{Sector,
Country},
research
[1] CHOICE
{product-based [0] NULL,
basic
[1] NULL},
production
[2] SEQUENCE
{Product-line,
Country }
} }
etc.
Figure 3.13 ASN.1 Data Type Definition Example 1
Notes
• Module name starts with capital letters
• Tags uniquely identify a data type
• Data types:
• Primitives: NULL, GraphicString
• Constructs
• Alternatives : CHOICE
• List maker: SET, SEQUENCE
• Repetition: SET OF, SEQUENCE OF
• Difference between SET and SEQUENCE
Network Management: Principles and Practice
© Mani Subramanian 2000
35
Chapter 3
Data Type: Example 2
Trade-message ::= SEQUENCE
{invoice-no
INTEGER
name
GraphicString,
details
SEQUENCE OF
SEQUENCE
{part-no
INTEGER
quantity
INTEGER},
charge
REAL,
authenticator
Security-Type}
Security-Type ::= SET
{
…
…
… }
Figure 3.14 ASN.1 Data Type Definition Example 2
Notes
• SET
– No order required
– Order not important
– Data types should all be distinct
• SEQUENCE
– The order in the list is maintained
• SEQUENCE OF SEQUENCE makes tables of rows
Network Management: Principles and Practice
© Mani Subramanian 2000
36
Chapter 3
Modules
Formal Definition:
<module name> DEFINITIONS ::= BEGIN
<name> ::= <definition>
<name> ::= <definition>
END
Example:
RFC1213 DEFINITIONS ::= BEGIN
…
…
END
Notes
• A module is a group of assignments.
• Modules can be imported into and exported
from other modules.
Network Management: Principles and Practice
© Mani Subramanian 2000
37
Chapter 3
ASN.1 Symbols
Symbol
Meaning
::=
Defined as
|
or, alternative, options of a list
-
Signed number
--
Following the symbol are comments
{}
Start and end of a list
[]
Start and end of a tag
()
Start and end of subtype
..
Range
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
38
Chapter 3
Keyword Examples
• CHOICE
• SET
• SEQUENCE
• OF
• NULL
Notes
• Keywords are in all UPPERCASE letters
Network Management: Principles and Practice
© Mani Subramanian 2000
39
Chapter 3
ASN.1 Data Type Conventions
Data Types
Convention
Example
Object name
Initial lowercase letter
sysDescr, etherStatsPkts
Application data type
Initial uppercase letter
Counter, IpAddress
Module
Initial uppercase letter
PersonnelRecord
Macro, MIB module
All uppercase letters
RMON-MIB
Keywords
All uppercase letters
INTEGER, BEGIN
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
40
Chapter 3
Data Type: Structure & Tag
Data Type
Tag
Structure
Number
Simple
Structured
Tagged
Other
Universal
Class
Application
Contextspecific
Private
Figure 3.15 ASN.1 Data Type Structure and Tag
Notes
• A Data Type is defined based on a structure and a tag
• Structure defines how data type is built
• Tag uniquely identifies the data type
Network Management: Principles and Practice
© Mani Subramanian 2000
41
Chapter 3
Structure
• Simple
• PageNumber ::= INTEGER
• ChapterNumber ::= INTEGER
• Structured / Construct
• BookPageNumber ::=
SEQUENCE
{ChapterNumber, Separator, PageNumber}
Example: {1-1, 2-3, 3-39}
• Tagged
• Derived from another type; given a new ID
• In Fig. 3-14, INTEGER could be either universal
or application specific
• Other types:
• CHOICE, ANY
Notes
• BookPages ::= SEQUENCE OF { BookPageNumber}
or
BookPages ::=
SEQUENCE OF
{
SEQUENCE
{ChapterNumber, Separator, PageNumber}
}
Network Management: Principles and Practice
© Mani Subramanian 2000
42
Chapter 3
Tag
• Tag uniquely identifies a data type
• Comprises class and tag number
• Class:
• Universal - always true
• Application - only in the application used
• Context-specific - specific context in application
• Private - used extensively by commercial
vendors
• Example (RFC 1155):
• IpAddress ::= [APPLICATION 0] IMPLICIT OCTET
STRING (SIZE (4))
• Counter ::= [APPLICATION 1] IMPLICIT INTEGER
(0..4294967295)
Notes
Example:
BOOLEAN
INTEGER
research
product-based
Universal 1
Universal 2
[Application 1] (Figure 3.13)
Context-specific under research [0]
Network Management: Principles and Practice
© Mani Subramanian 2000
43
Chapter 3
Enumerated Integer
RainbowColors ::= ENUMERATED
{
}
violet
(0)
indigo
(1)
blue
(2)
green
(3)
yellow
(4)
orange
(5)
red
(6)
Example From the SNMP MIB (RFC
1157):
ErrorStatus ::=
INTEGER {
noError (0),
tooBig (1),
noSuchName (2),
badValues (3),
readOnly(4),
genErr (5)
}
Notes
• ENUMERATED is a special case of INTEGER
• Does not have INTEGER semantics → Arithmetic
operations should not be performed on enumerated
values.
• Example: RainbowColors (5) is orange
Network Management: Principles and Practice
© Mani Subramanian 2000
44
Chapter 3
Subtype Data Type
• A subtype data type is derived from a
parent type.
Example:
PageNumber ::= INTEGER (0..255)
→ Limits the maximum page number to 255
Example (RFC 1213):
sysDescr OBJECT-TYPE
SYNTAX DisplayString (SIZE (0..255))
ACCESS …
…
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
45
Chapter 3
ASN.1 Module Example
• An entry of the address translation table in
SNMP IP MIB (RFC 1213) is the following:
IpNetToMediaEntry ::= SEQUENCE {
ipNetToMediaIfIndex
INTEGER,
ipNetToMediaPhysAddress
PhysAddress,
ipNetToMediaNetAddress
IpAddress,
ipNetToMediaType
INTEGER}
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
46
Chapter 3
ASN.1 Example from ISO 8824
Name:
John P Smith
Title:
Director
Employee Number 51
Date of Hire:
17 September 1971
Name of Spouse; Mary T Smith
Number of Children 2
Child Information
Name
Ralph T Smith
Date of Birth 11 November 1957
Child Information
Name
Susan B Jones
Date of Birth 17 July 1959
(a) Informal description of personnel record
--------------------------------------------------------------------------------------------------------PersonnelRecord ::= [APPLICATION 0] IMPLICIT SET {
Name,
title [0] VisibleString,
number EmployeeNumber,
dateOfHire [1] Date,
nameOfSpouse [2] Name,
children [3] IMPLICIT SEQUENCE OF ChildInformation DEFAULT { } }
ChildInformation ::= SET {
Name,
dateOfBirth [0] Date }
Name ::= [APPLICATION 1] IMPLICIT SEQUENCE {
givenName VisibleString,
initial VisibleString,
familyName VisibleString }
EmployeeNumber ::= [APPLICATION 2] IMPLICIT INTEGER
Date ::= [APPLICATION 3] IMPLICIT VisibleString -- YYYYMMDD
(b) ASN.1 description of the record structure
--------------------------------------------------------------------------------------------------------{ {givenName “John”, initial “T”, familyName “Smith”},
title
“Director”
number
“51”
dateOfHire
“19710917”
nameOfSpouse
{givenName “Mary”, initial “T”, familyName “Smith”},
children
{{
{givenName “Ralph”, initial “T”, familyName “Smith”},
dateOfBirth “19571111”},
{
{givenName “Susan”, initial “B”, familyName “Jones”}
dateOfBirth “19590717”}}}
(c) ASN.1 description of a record value
Network Management: Principles and Practice
© Mani Subramanian 2000
47
Chapter 3
Object Name
itu
0
iso
1
iso-itu
2
org
3
dod
6
internet
1
private
4
enterprise
1
IBM
2
Notes
• Example from RFC 1155:
internet OBJECT IDENTIFIER ::= {iso(1) org(3) dod(6) 1}
Network Management: Principles and Practice
© Mani Subramanian 2000
48
Chapter 3
TLV Encoding
Type
Class
(7-8th bits)
Length
P/C
(6th bit)
Class
Universal
Application
Context-specific
Private
Value
Tag Number
(1-5th bits)
th
th
8 bit 7 bit
0
0
0
1
1
0
1
1
P/C bit:
0: primitive
1: construct
Notes
• ASN.1 syntax containing management info is encoded
using the BER (Basic Encoding Rules) → defined for
the transfer syntax.
• ASCII text data is converted to bit-oriented data.
• TLV: Type, Length, and Value are components
of the structure.
• Length: of the Value field in number of octets.
• Value: is encoded based on the data type.
Network Management: Principles and Practice
© Mani Subramanian 2000
49
Chapter 3
TLV Encoding- INTEGER
Type
Class
(7-8th bits)
Class
Universal
Application
Context-specific
Private
Length
P/C
(6th bit)
th
Value
Tag Number
(1-5th bits)
th
8 bit 7 bit
0
0
0
1
1
0
1
1
P/C bit:
0: primitive
1: construct
• INTEGER: Universal 2
• Type: 00000010 [Class (00), P/C (0), Tag (00010)]
• Length:
• If Value length ≤ 127 → Use 1 octet (with b8 = 0)
• If Value length > 127 → Use >1 octet (with b8 = 1)
 First octet indicates number of octets
that follow to specify the Value length.
 Example: 128 → 10000001 10000000
• Value:
• If Value > 0 (always MSB = 0 → add more octets if needed)
 Example: 255 → 00000000 11111111
• If Value < 0 → twos-complement
 Takes the absolute value and inverts all 1s to 0s
and all 0s to 1s, then adds 1.
 Example: -5 → 11111011
• Example: TLV for 255
→ 00000010 00000010 00000000 11111111
Network Management: Principles and Practice
© Mani Subramanian 2000
50
Chapter 3
TLV Encoding- OCTET STRING
Type
Class
(7-8th bits)
Class
Universal
Application
Context-specific
Private
Length
P/C
(6th bit)
th
Value
Tag Number
(1-5th bits)
th
8 bit 7 bit
0
0
0
1
1
0
1
1
P/C bit:
0: primitive
1: construct
Notes
• OCTET STRING: Universal 4
• Type: 00000100 [Class (00), P/C (0), Tag (00100)]
• Length: Number of octets in Value.
• Value: Binary representation of string.
• Example: TLV for ‘0C1B’ →
00000100 00000010 00001100 00011011
Network Management: Principles and Practice
© Mani Subramanian 2000
51
Chapter 3
Macro
<macroname> MACRO ::=
BEGIN
TYPE NOTATION ::= <syntaxOfNewType>
VALUE NOTATION ::= <syntaxOfNewValue>
<auxiliaryAssignments>
END
Macro from RFC 2578 (SMIv2):
OBJECT-IDENTITY MACRO ::=
BEGIN
TYPE NOTATION ::=
"STATUS" Status
"DESCRIPTION" Text
ReferPart
VALUE NOTATION ::= value (VALUE OBJECT IDENTIFIER)
Status ::= "current" | "deprecated" | "obsolete“
ReferPart ::= "REFERENCE" Text | empty
Text ::= value(IA5String)
END
Example:
CS8803 OBJECT-IDENTITY
STATUS
current
DESCRIPTION "A graduate-level network
management course offered every fall by
College of Computing in Georgia Institute of
Technology."
::= {csclasses 50}
Notes
• Macro is used to create new data types
• TYPE NOTATION → defines the syntax of new types
• VALUE NOTATION → defines the syntax of new values
Network Management: Principles and Practice
© Mani Subramanian 2000
52
Chapter 3
Part II
Chapter 13
Network Management Applications
Network Management: Principles and Practice
© Mani Subramanian 2000
53
Chapter 13
Network and Systems Mgmt
Business
Management
Service
Management
Network
Management
System
Management
Element
Management
Resource
Management
Network
Elements
System
Resources
Networked Information Systems
Figure 13.1 Network and System Management
Notes
• TMN architecture expanded to include systems
management
Network Management: Principles and Practice
© Mani Subramanian 2000
54
Chapter 3
Functional Model
OSI
Functional Model
Configuration
Management
Fault
Management
Performance
Management
Security
Management
Accounting
Management
Notes
• Configuration management
• Set and change network configuration and
component parameters
• Network provisioning
• Inventory management
• Network topology
• Set up alarm thresholds
• Fault management
• Detection and isolation of failures in network
• Trouble ticket administration
• Performance management
• Monitor performance of network
• Security management
• Authentication
• Authorization
• Encryption
• Accounting management
• Functional accounting of network usage
Network Management: Principles and Practice
© Mani Subramanian 2000
55
Chapter 13
Network Provisioning
(Configuration Management)
• Provisioning of network resources
• Design
• Installation and maintenance
• Circuit provisioning in telephone industry
• Circuit-switched network
• Automated process
• Provisioning for packet-switched network based on:
• Performance statistics
• QoS requirements
• Example: Provisioning of links is based on
average and peak demands
• ATM networks
• Permanent virtual circuit (PVC)
• Switched virtual circuit (SVC)
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
56
Chapter 13
Inventory Management
(Configuration Management)
• Inventory Management of:
• Equipment
• Facilities
• Efficient Database system:
• Indices and keys for easy access and search
• Characteristics of components
• Status of components
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
57
Chapter 13
Network Topology
(Configuration Management)
• Manual
• Filter parameters → impose constraints
• Auto-discovery by NMS using
• Broadcast ping
• ARP table in devices (e.g., local router)
• Mapping of network
• Layout
• Layering
• Views
• Physical
• Logical
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
58
Chapter 13
Traditional LAN Configuration
Hub 1
Port A
Segment A
A1
A2
Router
Port B
Segment B
B1
Hub 2
B2
Figure 13.2 LAN Physical Configuration
A1
A2
Segment A / Hub 1
Router
Segment B / Hub 2
B1
B2
Figure 13.3 Logical Configuration of Two LAN Segments
Notes
• One-to-one mapping between physical and logical
configuration
Network Management: Principles and Practice
© Mani Subramanian 2000
59
Chapter 13
Virtual LAN Configuration
Hub 1
Segment A
A1
B1
Segment B
Port A / Segment A
Port A / Segment B
Segment A
Router
Switch
A2
Segment B
Hub 2
B2
Figure 13.4 VLAN Physical Configuration
A1 (Hub 1)
A2 (Hub 2)
Segment A / Hub 1 & 2
Router
switch
Segment B / Hub 1 & 2
B1 (Hub 1)
B2 (Hub 2)
Figure 13.5 Logical Configuration of Two VLAN Segments
Notes
• Physical and logical configurations different
• Physical location obtained from System group
Network Management: Principles and Practice
© Mani Subramanian 2000
60
Chapter 13
Fault Management
•
Fault is a failure of a network component
•
Results in loss of connectivity
•
Fault management involves a 5-step process:
1. Fault detection
•
Polling
•
Traps: linkDown, egpNeighborLoss
2. Fault location
•
Detect all components that failed and trace
down the tree topology to where the
problem starts
3. Restoration of service (has higher priority)
4. Fault isolation
• Identification of root cause of the problem
• Fault isolation by network and SNMP tools
to determine source of problem
→ Trouble ticket generated
• Use artificial intelligence /
correlation techniques
5. Problem resolution → Trouble ticket closed
Network Management: Principles and Practice
© Mani Subramanian 2000
61
Chapter 13
Performance Management
• Tools
• Performance Metrics
• Data Monitoring (e.g., RMON)
• Problem Isolation (process similar to FM)
• Performance Statistics
Notes
• Tools:
• Protocol analyzers
• RMON
• MRTG
Network Management: Principles and Practice
© Mani Subramanian 2000
62
Chapter 13
Performance Metrics
• Macro-level
• Throughput
• Response time
• Availability
• Reliability
• Micro-level
• Bandwidth
• Utilization
• Error rate
• Peak load
• Average load
Notes
• Macro-level parameters can be defined in terms
of micro-level parameters
• Response time depends on both network and
system performance.
Network Management: Principles and Practice
© Mani Subramanian 2000
63
Chapter 13
Data Monitoring and
Problem Isolation
• Data monitoring
• Normal behavior
• Abnormal behavior (e.g., excessive collisions,
high packet loss, etc)
• Set up traps (e.g., parameters in alarm group
in RMON on object identifier of interest)
• Set up alarms for criticality
• Manual and automatic clearing of alarms
• Problem isolation
• Manual mode using network and SNMP tools
• Problems in multiple components needs
tracking down the topology
• Automated mode using correlation technology
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
64
Chapter 13
Performance Statistics
• Traffic statistics
• Error statistics
• Used in
• QoS tracking
• Performance tuning
• Validation of SLA
• Trend analysis
• Facility planning
• Functional accounting
Notes
• Statistics require large amount of data sampling →
overhead traffic on the network.
• One solution is RMON → Collecting statistical data is
done locally → Improves overall network performance.
Network Management: Principles and Practice
© Mani Subramanian 2000
65
Chapter 13
Security Management
• Security threats
• Policies and Procedures
• Resources to prevent security breaches
• Firewalls
• Cryptography
• Authentication and Authorization
• Client/Server authentication system
• Message transfer security
• Network protection security
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
66
Chapter 7
Security Threats (RFC 3414)
Modification of information
Masquerade
Message stream modification
Management
Entity A
Management
Entity B
Disclosure
Figure 7.10 Security Threats to Management Information
Notes
• Modification of information: Contents modified by
unauthorized user, does not include address change
• Masquerade: change of originating address by
unauthorized user
• Message Stream Modification: Fragments of message
altered by an unauthorized user to modify the meaning
of the message
• Disclosure: is eavesdropping. This does not require
interception of message
• Denial of service and traffic analysis are not
considered as threats
Network Management: Principles and Practice
© Mani Subramanian 2000
67
Chapter 13
Security Threats
Modification of information
Masquerade
Message stream modification
Management
Entity A
Management
Entity B
Disclosure
Figure 7.10 Security Threats to Management Information
Notes
• SNMPv3 addressed security threats using USM
(user-based security model)
• USM has two modules:
• Authentication module
• Data integrity
• Data origin
• Privacy module
• Data confidentiality
• Message timeliness
• Message protection
Network Management: Principles and Practice
© Mani Subramanian 2000
68
Chapter 13
Policies and Procedures
Basic guidelines to set up policies and procedures:
1. Identify what you are trying to protect.
2. Determine what you are trying to protect it from.
3. Determine how likely the threats are.
4. Implement measures, which will protect your assets in
a cost-effective manner.
5. Review the process continuously and make
improvements to each item if a weakness is found.
Notes
• References:
• Formal statement of rules for protecting
organization’s technology and assets (RFC
2196)
• Introduction to Firewalls (NIST)
• Orange Book by National Computer Security
Center (NCSC) rates computers based on
security design features
Network Management: Principles and Practice
© Mani Subramanian 2000
69
Chapter 13
Accounting Management
• Least developed
• Usage of resources
• Hidden cost of IT usage
• Functional accounting
• Business application
Notes
Network Management: Principles and Practice
© Mani Subramanian 2000
70
Download