25
Prof. Shervin Shirmohammadi CEG 4395 5-1 Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa

Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

  • Upload
    lexuyen

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-1

Lecture 5:Foundation of

Network Management

Prof. Shervin ShirmohammadiSITE, University of Ottawa

Page 2: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-2

Network Management Standards• OSI:

– Common Management Information Protocol (CMIP)– International standard (ISO / OSI)– Management of data comm. Network – LAN and WAN– Deals with all 7 layers– Most complete– Object oriented representation– Well structured and layered– Consumes large resources in implementation

• Internet:– Simple Network Management Protocol (SNMP)– Industry standard (IETF)– Originally intended for management of Internet components, currently

adopted for WAN and telecom systems.– Easy to implement

• Most widely implemented NM standard.– Lacks advanced functionality (compared to CMIP)

Page 3: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-3

Network Management Standards (…)• Telecommunication Management Network (TMN)

– International standard of the ITU-T– Management of telecom networks– Based on the OSI network management framework– Addresses both network, administrative, and business aspects of

management.

• IEEE– Addresses LAN and MAN management.– Deals with the first 2 layers.

• Web-based Management– Web-based Enterprise Management (WBEM)– Java Management Application Program Interface (JMAPI)

• Desktop Management– Management of desktop PCs and applications

Page 4: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-4

Management Architecture

NetworkMangement

InformationModel

OrganizationModel

FunctionalModel

CommunicationModel

Figure 3.1 OSl Network Management Model

• This architecture is used for both OSI and SNMP-based management

• Consists of a number of models

Page 5: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-5

OSI Models• Organization– Network management components– Functions of components– Relationships

• Information– Structure of Management Information (SMI)

• Syntax and semantics

– Management Information Base (MIB)• Organization of management information

• Communication– Transfer syntax with bi-directional messages– Transfer structure (PDU)

• Functions– Application functions– Configure components– Monitor components

– Measure performance– Secure information– Usage accounting

Object-oriented

Page 6: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-6

SNMP Architecture and Models• Organization

– Same as OSI model

• Information– Same as OSI, but scalar

• Communication– Messages less complex than OSI and unidirectional – Transfer structure (PDU)

• Functions– Application functions– Operations– Administration– Security

Page 7: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-7

Organizational Model• Manager

– Sends requests to agents– Monitors alarms– Houses applications– Provides user interface

• Agent– Gathers information from objects– Configures parameters of objects– Responds to managers’ requests– Generates alarms and sends them to mangers

• Managed object– Network element that is managed– Houses management agent– All objects are not managed / manageable

Implementation approaches:

- Two-tier

- Three-tier

- MoM

Page 8: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-8

Managed Object

• Managed objects can be– Network elements (hardware, system)

• hubs, bridges, routers, transmission facilities

– Software (non-physical)• programs, algorithms

– Administrative information• contact person, name of group of objects

(IP group)

Page 9: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-9

Two-tier Organizational Model

Manager

Managed objects

Unmanaged objects

Figure 3.2 Two-Tier Network Mangement Organization Model

Agent process

MDB

MDB Management Database

• Agent built into network element; e.g., Managed hub, managed router.

• An agent can handle multiple elements.; e.g., Switched hub, ATM switch

• MDB is a physical database• Unmanaged objects are network

elements that are not managed -both physical (unmanaged hub) and logical (passive elements).

Page 10: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-10

Three-tier Organization Model

Agent / Manager

Managed objects

Agent process

Manager

Figure 3.3 Three-Tier Network Mangement Organization Model

MDB

MDB

MDB Management Database

• Middle layer plays the dual role– Agent to the top-level

manager– Manager to the managed

objects

• Example of middle level: Remote monitoring agent (RMON)

Page 11: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-11

A Manager of Managers (MoM)

MoM

AgentAgent NMS

Manager

Managed objectsManaged objects

Figure 3.4 Network Mangement Organization Model with MoM

Agent process

MDB

MDB MDB

MoM Manager of ManagersMDB Management Database

AgentManager

Agent NMS

AgentAgent NMS

Manager

• Domain may be geographical, administrative, vendor-specific, etc.

• Web-based managementproject uses similar concept.

• MoM presents integrated view of domains.• Agent manages the domain

Page 12: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-12

Information Model• Analogy:• A figure in a book is uniquely identified by

– ISBN, Chapter, and Figure number in that hierarchical order

• ID: {ISBN, chapter, figure number}• The three elements above define the syntax• Semantics is the meaning of the three entities; e.g., according to

Webster’s dictionary• The information comprises syntax and semantics about an object.• In network management, SMI and MIB are used for similar

purposes: defining and identifying specific managed objects.

Page 13: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-13

Structure of Management Information (SMI)

• SMI defines a managed object– Syntax and Semantics plus additional information such as

access and status.

• ExamplesysDescr: { system 1 }Syntax: OCTET STRINGDefinition: "A textual description of the entity. "Access: read-onlyStatus: mandatory

Page 14: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-14

Management Information Base (MIB)

• MIB contains information about objects.• Organized by grouping of related objects.• Defines relationship between objects.• It is not a physical database. It is a virtual database that is

compiled into management module.• Analogy:

– UofO library system has many branches.– Each branch has a set of books.– The books in each branch is a different set.– The information base of UoO has the view (catalog) of all books.– The information base of each branch has the catalog of books that

belong to that branch.• That is, each branch has its view (catalog) of the information base

Page 15: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-15

Management Data Base vs.Management Information Base

• Distinction between MDB and MIB– MDB physical database; e.g.. Oracle,

Sybase– MIB virtual database; schema compiled

into management software

• An NMS can automatically discovera managed object, such as a hub, when added to the network.

• The NMS can identify the new object as hub only after the MIB schema of the hub is compiled into NMS software.

Manager

Managed objects

MDB MIB

Page 16: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-16

Root

Level 1

Level 2

Level 3

Figure 3.7 Generic Representation of Management Information Tree

Management Information Tree

• Managed objects are uniquely defined by a tree structure similar to the one shown below:

Page 17: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-17

OSI Management Information Tree

iso-itu2

itu0

iso1

org3

dod6

internet1

Figure 3.8 OSI Management Information Tree

This tree is not complete!!

• iso = International Standards Organization

• itu = International Telecommunications Union

• dod = Department of Defense• All have come together to

define the OSI Management Information Tree.

• Designation:– iso 1– org 1.3– dod 1.3.6– internet 1.3.6.1

Page 18: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-18

Object Type and Instance• Internet perspective:

– Acquired from the IETF RFC 1155 (Managed Object in the Internet Model)

– Type:• name (unique ID and name for the object type)• syntax (used to model the object)• access (access privileges to the object)• status (implementation requirements)• definition (textual description of the semantics)

– This is a scalar model that is easy to understand.

notifications emitted by the objectnotifications

Behaviour exhibited by the object in response to operation

behaviour

operations which may be applied to itoperations

attributes visible at its boundaryattributes

managed objectobject class• OSI perspective:– Object oriented

model rather than scalar.

– Has the capability to do more.

Page 19: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-19

Internet Example

• Example of a circle:• object ID = circle• syntax = English syntax• access = John Smith• status = mandatory• description = “A plane figure bounded by a single curved line, every point of which is of equal distance from the center of the figure”

Object Type:Object ID and

Descriptorcircle

Access:Access

privilege

Defintion :Semantics -

textual description

Status :Implementaionrequirements

Syntax :model of object

Figure 3.9(a) Internet Perspective

Page 20: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-20

OSI Example

Behaviour

Object Class:Circularobject

Ob

ject

Cla

ss:

Elli

ptic

alob

ject

Attributes:circle, dimension

Operations:Push

Attributes:ellipse, dimension

Notifications :Notify changes inattribute values

Figure 3.9(b) OSI Perspective

Page 21: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-21

Packet Counter Example:Internet vs. OSI

Counts number of packets

Description

MandatoryStatus

Read-onlyAccess

CounterSyntax

PktCounterObject type

ExampleCharacteristics

Generates notifications on new value

Notifications

Retrieves or resets valuesBehavior

get, setOperations

Single-valuedAttributes

Packet CounterObject class

ExampleCharacteristics

Internet OSI

Page 22: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-22

Internet vs. OSI Managed Object• Scalar object in Internet vs. Object-oriented

approach in OSI.• OSI characteristics of operations, behaviour, and

notification are part of communication model inInternet: get, set, response, and alarm.

• Internet syntax is absorbed as part of OSI attributes.• Internet access is part of OSI security model.• Internet status is part of OSI conformance application.• OSI permits creation and deletion of objects;

Internet does not.– Enhancement in SNMPv2

Page 23: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-23

Manager Agent

Operations /Requests

Responses

Notifications /TrapsApplications Network Elements /

Managed Objects

Figure 3.11 Management Message Communication Model

Communication Model • Internet: requests/response• OSI: operations• Internet: traps and notifications (SNMPv2)• OSI: notifications

Page 24: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-24

Transfer ProtocolsManager

Applications

AgentApplications

ManagerCommunication

Module

AgentCommunication

Module

TransportLayers

TransportLayers

Operations / Requests / ResponsesTraps / Notifications

SNMP (Internet)CMIP (OSI)

UDP / IP (Internet)OSI Lower Layer Protocols (OSI)

Physical Medium

• OSI uses CMISE (Common Management Information Service Element) application with CMIP (Common Management Information Protocol).

• OSI specifies both connection oriented and connectionless transport protocol. SNMPv2 extended to connection oriented, but rarely used.

Page 25: Lecture 5: Foundation of Network Managementshervin/courses/ceg4395/lectures/Lecture05f.pdf · Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University

Prof. Shervin Shirmohammadi CEG 4395 5-25

Functional ModelOSI

Functional Model

FaultManagement

ConfigurationManagement

PerformanceManagement

SecurityManagement

AccountingManagement

• Configuration management– Set and change network

configuration and component parameters

– Set up alarm thresholds• Fault management

– Detection and isolation of failures in network

– Trouble ticket administration• Performance management

– Monitor performance of network

• Security management– Authentication– Authorization– Encryption

• Accounting management– Functional accounting of network usage