1 overview of network management mi-jung choi dept. of computer science knu email:...

24
1 Overview of Network Management Mi-Jung Choi Dept. of Computer Science KNU Email: [email protected]

Upload: terence-griffith

Post on 05-Jan-2016

229 views

Category:

Documents


0 download

TRANSCRIPT

1

Overview of Network Management

Mi-Jung Choi

Dept. of Computer Science

KNU

Email: [email protected]

2

Table of Contents

• Today’s Networks• Network Management Requirements• Network Management Systems• Distributed Network Management• Proxy Agent• Standard Management Frameworks

(3)

INTERNET

Satellite

BroadcastNetworks

(DAB, DVB-T) CDMA, GSM, GPRS

IP-based micro-mobility

Wireless LANs

WiBro, HSDPA

Bluetooth Zigbee

FastEthernet

B-ISDN

ATMSONET PSTN

ISDN

10 GigabitEthernet

GigabitEthernet

WANsSS#7

IN/AIN

PSDN

xDSL/Cable

Ethernet

FTTH

Today’s NetworksToday’s Networks

4

NM Users’ Requirements

• Controlling corporate strategic assets– effective control of network & computing resources

• Controlling complexity– continued growth of devices, users, applications & protocols

• Improving service– users expect better service with increased resources

• Balancing various needs– must assign and control resources to balance various needs

• Reducing downtime– more users and applications depend on availability

• Controlling costs– effective resource utilization in order to control costs

5

NM Functional Requirements• Fault Management

– detection, isolation and correction of abnormal operations

• Configuration Management– identify managed resources and their connectivity, discovery

• Accounting Management– keep track of usage for charging

• Performance Management– monitor and evaluate the behavior of managed resources

• Security Management– allow only authorized access and control

FCAPS

6

Fault Management

• concerned with:– providing a reliable networking environment– ensuring that the systems as a whole, and each essential component

individually, are in proper working order– redundant components and routes can be used to increase fault

tolerance

• when a fault occurs, the manager should be able to:– determine exactly where the fault (i.e., abnormal condition) is– isolate the rest of the network from failure – reconfigure or modify the network for continued operation– repair or replace the failed components to restore the network

7

Configuration Management

• concerned with:– initializing a network & shutting down part or all of the network– maintaining, adding and updating the relationships among

components– monitoring the status of components during network operation

• the network manager should be able to:– startup and shutdown operations on a network– identify the components that comprise the network (discovery)– change the connectivity of the components (possibly as a result of

network upgrade, fault recovery or security checks)– detect changes in the network configuration

8

Accounting Management

• concerned with:– keeping track of the usage of network resources– charging the use of network resources– monitoring the end-user activities for possible abuse, for suggesting

better usage to users and for network planning

• the manager should be able to:– specify the kinds of accounting information to be recorded at various

nodes– specify the algorithms to be used in calculating the charging– generate accounting reports

9

Performance Management

• concerned with:– providing an efficient communication environment– monitoring and analyzing the performance of the components– making proper adjustments to improve network performance

• the manager should be able to:– determine the capacity utilization, throughput, the average and worst-

case response times– monitor and gather data on the activities of components– analyze the gathered data and assess performance levels– determine the sources of performance problems & fix them– use the performance stats for future network planning

10

Security Management

• concerned with:– providing a secure networking environment– preventing hacking, illegal and unauthorized access– managing information protection and access-control facilities

• the manager should be able to:– generate, distribute and store encryption keys– maintain and distribute passwords and other authorization or access-

control information– monitor and control access to networks– collect, store and examine audit records and security logs– enable & disable the logging facilities

11

Network Management Systems

• A network management system (NMS) is a collection of tools for network monitoring and control

• based on the manager-agent paradigm– the manager sends mgmt requests to one or more agents– an agent performs the requested operation and returns results– when agents detect faults and they report to the manager

• NMS typically provides a GUI through which most or all management tasks can be performed

• Many commercial and freely available NMSs exist: – HP OpenView, IBM NetView, Sun Net Manager, etc.– research prototypes from CMU, MIT, UC Davis, U. of Twente

12

AgentAgent Agent

AgentAgent Agent

Agent

Collect, organize & interpretOperational Data

AdministratorWorkstation

Management Platform

Observation & Control

mgmt requests/replies

event reports

13

Elements of an NMS

NMA

NME Appl

Comm

OS

NME Appl

Comm

OS

NME Appl

Comm

OS

NME

Comm

OS

Network controlhost (manager)

Server(agent)

Workstation (agent)

Router(agent)

NMA = network management applicationNME = network management entityAppl = applicationComm = communications softwareOS = operating system

Networks

14

Network Management Entity (NME)

• NME is a collection of software devoted to the network management tasks

• is typically known as an “management agent”• Each NME performs the following tasks

– collects statistics on communications and network-related activities– stores statistics locally– responds to commands from the network manager, including

commands to:• transmit collected stats to network manager

• change an attribute value

• provide status information

• generate artificial traffic to perform a test

• etc.

15

Network Mgmt Application (NMA)

• NMA is a collection of software for performing network monitoring and control

• is typically known as “network manager”• NMA provides an operator interface to allow an authorized

user to manage the network• NMA responds to user commands by displaying information

and/or issuing commands to NMEs• Standard protocols (e.g., SNMP, CMIP) are used to manage

a multi-vendor network• there may be more than one NMA in a large network which

can lead to the need of a hierarchy of managers (e.g., top level manager, middle level managers, etc.)

16

NM Management Tasks

Modeling

Instrumentation

Communication & Operation

(Protocol)

AnalysisPresentation

Agent

Manager

ManagedResource

ManagementApplication

Gateway

Specification& InteractionTranslation

17

Distributed Network Management

• Resources to be managed are widely distributed – widespread use of departmental LANs– need for local control & optimization of distributed applications

• Hierarchical NM architecture desirable– distributed NMSs are given limited access for network monitoring and

control of departmental resources– top-level NMS has a global access rights and the ability to manage

all network resources

• Benefits of Distributed NM– NM traffic overhead is minimized - traffic is localized– Dist. mgmt offers greater scalability– use of multiple NMSs eliminates the single point of failure

18

Typical Dist. Mgmt System Architecture Management clients (PCs, workstations)

Network

Network

Management server

Management application

MIB

Element manager

Element manager

Network resources (servers, routers, hosts) with management agents

Management server

Management application

MIB

19

Proxy Agents

• Managed resources may have various mgmt interfaces– some with different mgmt protocols (e.g., OSI vs. SNMP, XML vs.

SNMP)– some with proprietary mgmt interfaces (e.g., older systems)– small systems not capable of possessing NME (e.g., modems)

• Proxy agents are used to manage these devices– managers use standard protocols to communicate with proxies– proxy agents use proprietary protocols to communicate with

proprietary devices– proxy agents perform translations between managers and proprietary

devices– an agent to the manager and a manager to proprietary devices

20

Proxy Agent Architecture

Proxy Agent

Protocol stack

Client proxy stub

Protocol stack

Proprietary management interface

Server proxy stub

Management application

Client stub

Protocol stack

Server stub

Protocol stack

Standard operations and event reports

Proprietary operations and event reports

21

Standard Management Frameworks

• Internet Network Management Framework (IETF)– SNMPv1 (Internet Full Standard)– SNMPv2 (Internet Full Standard)– SNMPv3 (Internet Full Standard)

• OSI Network Management Framework (ISO/ITU-T)– CMIP (X.700 Series)

• Telecommunication Management Network (ITU-T)– TMN (M.3000 Series)

• Distributed Management Task Force (DMTF)– DMI, CIM, WBEM

22

Summary• Network Management Requirements

– Users’ Requirements– Functional Requirements (FCAPS)

• Network Management Systems– Network Management Entity (NME)– Network Management Application (NMA)

• Distributed Network Management• Proxy Agent• Standard Management Frameworks

• READ Chapter 1 of Stallings

23

Useful Internet Resources• USENET News Groups

– comp.protocols.snmp– info.snmp– comp.dcom.net-management

• Web Sites– http://netman.cit.buffalo.edu/– http://snmp.cs.utwente.nl/– http://www.tmforum.org/– http://www.ietf.org/html.charters/wg-dir.html– http://www.dmtf.org

24

Questions?