MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi Faculty of Computing Studies, Gulf College Muscat, Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com Mohanned Al-Obaidy Faculty Head for Computing Awards, Gulf College Muscat, Sultanate of Oman. Email: mohaned@gulfcollegeoman.com Abstract: This paper is to be given an overview for the implementation of a Network Monitoring System to monitor the network resources using SNMP (Simple Network Management Protocol). It consists of manager, agent and managed services. The manager responsibility is to monitor the agents. The agents are software that manage all the network devices and send the details report about the managed objects to the manager. The agent should manage each network device based on the feedback received from the manager. It is an integrated part of the network infrastructure enables the local administrator to perform real-time monitoring on a big network. It helps the administrator to keep up his job more challenges. There are many problems are faced by the network administrator during the manual monitoring of the whole network such as concerned with the performance, analyses and controls of various components of the network. It is very difficult to identify the problems by the administrator. This paper describes the process of SNMP and implementation in network. Keywords: SNMP, NMS, MIB 1. INTRODUCTION TO NETWORK MANAGEMENT Network Management is more support for the Network administrators to monitor and control the hardware and software system that comprise an internet. It can easily design and implement the efficient and robust network infrastructure and also record the status of nodes in their network. The main goal of the network management is to detect and correct number of problems occur in the network. The network management supports network monitoring system (NMS). The network administrator uses the NMS to monitor, configure, to take statistic record performance of the network devices and security of the whole network in one place. The main function of NMS is given below. NMS can be located on each segment of a network NMS can observe and record the activity of the network devices and also identify fault and isolated the problems NMS monitors the network round the clock without human intervention NMS can view the whole network traffic from one location. NMS can identify how much the network devices are used and how many packets are sent and received by each network devices. 2. ISO NETWORK MANAGEMENT MODEL ISO provides five network management functional areas which are support to achieve the following goals: Configuration management Fault management Performance management Accounting management Security management 2.1 Configuration Management The network administrators can monitor and control the network operations. When the administrators do the configuration, the following things should understand during the configuration. How the network are configure Identify the network devices name and IP addresses Identify the network device operations and relationship between the network devices Identify the routing details of each network devices The administrators have collected configuration data for all the network devices. 2.2 Fault Management During the network operations, the network administrators can able to find the abnormal network operations which leads the whole network may be shutdown. So the networks administrators must detect, isolate, notify, and correct the fault during the monitoring. 2.3 Performance Management The network performance is very important for the organization. The network administrators must be analysis and measure all the network devices and control the performance of the network devices utilization, Throughput, packet delay and error rate. The overall performance can be maintained at an acceptable level. The main goal of this management is to make the network performance optimally. 2.4 Accounting Management In this management, the network administrators can able to gather usage of information consumed by the user and network devices. Based on this information, the administrator can identify the cost for the network services and also analysis of the existing network load and proposal network capacity for the organization. The administrator grants the privilege for the user to access the network devices such as add, delete new users and setting usage limitations. 2.5 Security Management Security is very important for the organization to keep their information more secure. The organization network prevents the information from the unauthorized person. The network administrators provide access to network devices and corporate resources to authorized persons. It concern with monitoring of security intrusion detection user security management (passwords) Security configuration management Example: firewalls and proxies Security audits Network monitoring system supports all the functions of ISO network management. The network monitor system is based on Graphical User Interface (GUI). SNMP (Simple Network Management Protocol) is one of the protocol supports Network Monitoring System. It is a powerful management tools to monitor the network devices in local area network. 3. SCENARIO The organizations may have small business, multienterprise business and multinational business network. All these organization have both LANs and WANs. Some organization network has more application oriented. Some have faster connection network between organizations. Some organization uses remote applications. All these organization has common thread from time to time. Every network has its own problems, very few organizations have tools to find the error and fix them because of its cost and time. The big organization has a very large network. It is very difficult to monitor and control manually. These types of organization need NMS to remotely control and monitor the network devices. If one device is fails the other part of the device network will be affected. The network is more congestion it leads to delay to deliver the packets. Sometime the performance of the network device is very slow. There are many reasons for that. These entire problems can be solved by the NMS using SNMP management. 4. INTRODUCTION OF SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) The network is composed of many different types of devices. The operation of the network sometimes works smoothly and sometime it would not. So the network begins to experience problems. It becomes very slow. It is possible the whole network are monitored or analyzed without the network administrator. Most of the devices on the network support network management protocol. It facilitates exchange of the management information between network devices. Numbers of different protocols exist to support network management. One of the protocols is Simple Network Management Protocol (SNMP). This protocol is very simple to operate, easy to implement and industry standard protocol. It plays an important role to monitor network performance, to find the network problems and solve those problems without human intervenes. The Network administrator can easily find the performance of the hardware devices in effective ways and also record the performance details of the hardware such as the average and peak network utilisation the average and peak frame size the average and peak number of frames per second the number of broadcasts domain the number of collisions per second the number of CRC errors during the frame transmission network devices and give the response according to manager request.The main responsible is to maintaining local management information and gives the feedback to a manager through SNMP. All the management information are stored in its MIB. To determine the frame size during the transmission such as the number of error frame. Example. Short frame (runts) and long frames (jabbers). Runts means the frame size less than 64 bytes and jabber means the frame size more than 1514. Perform auto discovery of the network devices. Identification of the delay, throughput of packet during the transmission. Performance analyses are useful for analysis the current system and identify the future requirements needs for the organization. Figure 2: Message flow between Manager and Agent The Figure-2 indicates the flow of messages between SNMP Manager and SNMP Agent. The manager can get the information from the agent about their managed object information. The manager can use get-next to get the next object in the managed device. The manager can use get-bulk to get group of data from the agent. The manager can use set to set the value of a managed object. The agent can able to send a trap to the manager about some event occurs in managed device Figure 1: Diagram of Network Monitors 5. COMPONENT OF SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) The Simple Network Management Protocol (SNMP) is an application layer protocol in network management. SNMP protocol can easily design and implement according to the organization requirements. SNMP enable the network administrators to manage whole networks for the organization. This protocol is a part of TCP/IP. Most of the modern tools are support the SNMP. SNMP consists of four components: The SNMP Manager has responsibility to manage one or more agents from a remote place. The Manager is software which is installing on the server. The manager can query SNMP agents by use of SNMP commands. When problems are occurred, the agent automatically informs the manager. The manager can also access the management information of the agent. The SNMP manager can also communicate to the network devices using commands to changing values in an agent’s database. The SNMP Agents are software that is installed on the managed devices. The agent can able to communicate with the manager. The agent can record the management information about the The Management Information Base (MIB) is a database which holds the information about all network devices. Using this information, the administrators can able to identify and isolate the fault and also useful to monitor and manage the network operations. MIB is a part of SNMP agent software which kept the information about objects such as variables. Each variable is assigned a unique identifier that is called an object identifier (OID). This information can also be accessed by agents. The SNMP manager will be able to access the MIB information for all the agents on the network. MIB Objects: MIB object defines the following groups of objects indicate in Table 1. Table 1: indicate MIB Objects System name, location, description Interfaces network interface statistics (traffic) IP IP stats ICMP ICMP stats (error reporting) TCP TCP stats (TCP algorithms) UDP UDP stats Each SNMP managed device keeps a list of variables (objects), e.g. a router might have a variable called buffer_overflow_count. The exact format and name of these variables is standardized for a wide range of network devices. Each object can represented using a language called Abstract Syntax Notation (ASN.1). The ASN.1 is a platform-independent language which allows for object (variable) definition. The SNMP Protocol allows as reading and writing and transferring the statistic information about network devices. Each message is transferred on internet using UDP. SNMP support the TCP/IP protocol which is used to transfer the agent’s queries and to make some changes in the objects. The manager checks the state of the agent through periodical polls using UDP and IP protocol. It indicates the message flows in SNMP protocol stack figure 3. 6. DESIGN SNMP AND IMPLEMENTATION OF The organization plans to implement the SNMP management, the organization need the following requirements which indicate in Table 2. Table 2: shows SNMP management requirements. Manageable Network Devices Agents Manager Routers, Servers, switches, bridges, Hubs, computer and printer Agents are small software modules that are manages the devices Network control center. It works on UNIX or Microsoft server The organization’s complex development activities required the cooperation of multiple business units in different locations. All these organizations have architected centrally to bring together to the same set of applications. In this types of organization structure, we can implement remote application infrastructure which is a perfect solution for its user which enable to access the network resources and share the documents. Each organization has LAN and WAN network. The network consists of network devices such as computer, server, hub, switch and routers. The organization has composed by various departments. Most of the organization, the IT department takes the responsibility to control the organization networks. All the department network devices are connected to the main server which is monitored by the network administrator in the IT department. Most of the organization is based on client-server network. In the implementation to show how effective NMS can help to solve network problems before it occur. The NMS design of LAN and WAN for the organization indicated in Figure 4. Figure 3: SNMP protocol Stack The SNMP protocol uses well known port number of UDP (161 and 162). SNMP runs on top of UDP. The agent three request message is port 161. The manager for trap messages port is 162. Because it works by exchanging a limited number of types of message. The manager and agent can be communicated using three types of messages such as get, set and trap. Figure 4: Organization Network Management design of LAN and WAN The SNMP protocol used to monitor and control the network devices operate at application level, the manager remains in a single location and use network technology to communicate with network devices. When the manager needs to interact with specific network devices, the manager runs application program act as client, and an application program on the network device acts as server. The client application that runs on the manager’s computer is called a manager, and as server that runs on the network device is called as agent. SNMP agent is loaded on a computer with MIB database. Then agent is configuring with SNMPs Manager using specific SNMP commands. The manager also configures to agent along with MIB to send Traps or Notifications. SNMP agent receives a request, and read the value of MIB variable, which is specified in the list of variables, and the result of the required value is sent back to the manager. The manager can query each agent and get the management data about the network devices which is stored in the MIB. The agent can send unsolicited information to the manager. Each device was configured to report to a central NMS. The NMS automatically discovers if any new network devices are attached to the network. Manager queried each device for its interface utilization and ping latency statistics on regular basis. Figure 5 indicates result of ping latency information across the network devices. SNMP can collect the report about the CPU utilization and also disk utilization which are indicating in figure 7 and Figure 8. Figure 7: CPU utilization reports provided by SNMP. Figure 8: Disk utilization reports provided by SNMP. The communication happens between manager and agents using SNMP protocol. SNMP uses three types of communication methods. Figure 5: Display ping latency graph of different network devices. The SNMP is used to gather network devices statistics and its configuration. SNMP is a communication framework for all kinds of network devices. Each device can receive and respond to SNMP request or send its own traps. The central monitoring server can able to analysis for the behavior across the servers and network devices. As a result, indicates in Figure 6. It is easily to find and prevent the network problems because it can be tracked to specific endpoints and behavior. Figure 6: Display the analysis information of server and network devices. 1. Request to do the Task A manager requests an agent to provide certain information about the managed devices. For example, router will forward or receive the packets. It keeps number of packer in the routing table. So the manager can request to get this information to check whether the router is congested or not. 2. Force to Do the Task A manager forces an agent to perform some task by resetting the agent’s variables. For example, an agent regularly to checks the value of its reboot counter. If the reboot counter is zero, it reboots itself. So the manager can send a message to this agent to reset its counter to zero. In this manner, the manager can reboot the agent remotely. 3. Warning Message An agent warns the manager of an unusual situation. For example, Agent is a computer running an email server. When it suddenly receives a very large number of messages from a certain host in the Internet, it sends a trap message to warn the manager. 7. IMPROVEMENTS IN PERFORMANCE OF SNMP Network monitoring system needs to be improve its performance because of organization network may in growth in size and complexity of MIBs according to the requirements of the organization. There is a need to improve the efficiency of the base protocol. The performance can be increased by the following two techniques. 1. Tipelining Algorithm 2. Parallel Algorithm The Tipelining Algorithm invokes multiple threads of GET NEXT operations within the manager targeted at one agent. The agent processes each request which is received from the manager. The manager does not have to wait for the response to the preceding request before firing off the next. The increase in efficiency comes from the fact that the latency of the round-trip delay is eliminated. The Parallel Algorithm invokes group of the request (threads) into single SNMP operations. This may reduce the traffic flow and increase the process load on the server. Most of the traffic flows are based on round up time and timeouts, which are implemented by both techniques, so it does not to overrun the agent with request. CONCLUSION 8. SNMP IN WAN (WIDE AREA NETWORK) 2. Douglas E Comer and Ralph E Droms “Computer Networks and Internets with Internet Applications”, 4th Ed, Prentice Hall. When SNMP protocol implements over in wide area network, the SNMP traffic can be slow down and response time for the normal traffic also slowdown. All the network devices are interrogated by the SNMP protocol. So all the network devices do the extra processing, for these reasons it is better not to poll network devices more frequently. Sometime when the organization needs to be implemented a dedicated or point to point separate network connection used to manage the network traffic. So it does not delay the passage of data transfer. 9. SNMP STRENGTH Widespread popularity Many standard MIBs available Many products available Network discovery Analysis of the packets Network device performance report Configuration managements Security aspects Monitor Test the connectivity and reach ability Now a day the network monitoring system has grown dramatically and reduced the administrator work drastically by using SNMP. There are many benefits the administrator will get such as monitoring the performance of network devices, to detect, isolate and recovery the fault from the network devices, to gathering the statistic performance data, to control network device remotely and also identify current and future growth of the network for the organization. The network administrator is also able to control the time periods when users or groups can access the network resources. The organization can able to bring quickly each network device under centralized management. Using NMS gives the solution to network administrator to quickly implement and distribute the change across the network infrastructure. The result is great improvement in the performance of network devices in the organization. REFERENCES 1. Behrouz A. Forouzan “Data Communication and Networking”, 5th Ed, Tata McGraw Hills. 3. Andrew Tanenbaum, “Computer Networks”, 4th Ed, Prentice Hall. 4. Larry L. Peterson S. Davie, “Computer Networks A System Approach”, 4th Ed, Morgan Kaufmann. 5. Hossein Bidgoli, “The Handbook of Computer Networks”, Volume-2, 5th Ed, Wiley. 6. Fred Halsall, “Computer Networking Internet”, 5th Ed, Addison Wesley. and 7. Curt M. White, “Data Communication and Computer Networks: A Business User’s Approach”, 7th Ed, Prentice Hall. 8. John Cowley, “Communications and Networking: An Introduction”, 2007, Springer. 9. David Miller, “Data Networks”, 3th Ed. Communication and 10. Jonathan Saperia, “SNMP at the Edge: Building Effective Service Management Systems”