network management protocols and applications cliff leach mike looney danny mar monty maughon
TRANSCRIPT
![Page 1: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/1.jpg)
Network Management Protocols and Applications
Cliff Leach
Mike Looney
Danny Mar
Monty Maughon
![Page 2: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/2.jpg)
Simple Network Management Protocol
• a.k.a. SNMP
• Most widely used network management protocol
• Designed in 1988 based on SGMP – Router management protocol
• Allows management of network devices
![Page 3: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/3.jpg)
What Does SNMP need?
Managed Networking Devices– Routers, Switches, UPS, and Servers
Devices must support SNMP– Typically manageable devices support SNMP
– Operating Systems have SNMP services available
![Page 4: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/4.jpg)
How Does SNMP Work?
Agents– Collects data about the network device.
Manager – Processes the collected data and stores it in a database called Management
Information Base (MIB)
Protocol Data Unit– The data that is collected and transferred between Agents and Managers
![Page 5: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/5.jpg)
Common Management Interface Protocol
• Used by Large Companies
• Supports all layers of the OSI model
• Costly to implement and takes more time
• Has More control than SNMP
![Page 6: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/6.jpg)
Remote Monitoring Protocol
• Standard MIB for monitoring network usage and network
troubleshooting– First defined in 1992 by IETF called RFC 1271
• Replaced by RFC 1757 standard in 1995– Define objects and statistics for network administrators to analyze
network
• Console managers and probes on the network must be RMON compliant
![Page 7: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/7.jpg)
RMON Grouping Elements
Organized into nine optional groups that rely on each other– Although they are optional, few of the groups need support from other groups in order to function
– Some groups can stand alone, but others depend on other groups
Nine Groups:Statistics, History, Alarm, Host, HostTopN, Matrix, Filters, Packet
Capture, and Events
![Page 8: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/8.jpg)
Multi-Router Traffic Grapher
• Network Management Application
• Works on UNIX, Windows, and MAC OS 10.1
systems
• First Published in 1995
![Page 9: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/9.jpg)
How does MRTG work?
Consists of a PERL script– Uses SNMP to read traffic counters and C program to log network traffic
Creates Graphs in GIF format– Represents the traffic monitored on a network connection
– Embedded into web pages and can be viewed by any web browser
![Page 10: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/10.jpg)
How does MRTG work?
• Creates visual representations of network traffic
• Logs its data to an ASCII file
• Log file is constantly being consolidated
![Page 11: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/11.jpg)
Other Advantages
• Not just limited to monitoring network traffic
• Monitors system loads, login sessions, modem
availability
![Page 12: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/12.jpg)
Problems
• Scalability and Portability• Released Version 2.0 in January 1997• Faster and more user-friendly• Maintains its log files more efficiently
![Page 13: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/13.jpg)
Issues with MRTG 2.0
• Had performance and flexibility problems• People are monitoring “non-traffic” sources• Led to the development of Version 3.0
![Page 14: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/14.jpg)
LANWatch 32
• Well suited for basic analysis, however more
complex tasks are difficult
• Monitors network traffic in real time
![Page 15: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/15.jpg)
Features
• Easy-to-use interface with pull-down menus • Graphic display of detailed network statistics • Decodes over 60 network protocols, including:
– TCP – UDP – IP – IPv6
• Provides over 400 filters to isolate network traffic • Software-based, easily portable to remote sites
![Page 16: Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f115503460f94c24006/html5/thumbnails/16.jpg)
Sample Screenshot