SlideShare a Scribd company logo
1 of 17
www.oeclib.in
Submitted By:
Odisha Electronic Control Library
Seminar
On
SNMP
Introduction
• The Simple Network Management Protocol (SNMP) is by far, the
dominant protocol in network management.
• A key reason for its widespread acceptance, besides being the
chief Internet standard for network management is its relative
simplicity.
What is SNMP?
• SNMP is used for collecting information from network devices
like servers, switches, hubs, printers and routers on an Internet
Protocol (IP) network. It is a popular protocol for network
management.
• It is a part of Transmission Control Protocol Internet Protocol
(TCP⁄IP) protocol suite.
SNMP Management
• SNMP management has become the dominant standardized
network management scheme in use today.
• The SNMP set of standards provide a framework for the
definition of management information along with a protocol
for the exchange of that information.
• The SNMP model assumes the existence of managers and
agents.
How does SNMP work?
• The simple network management protocol
(SNMP) use for monitoring of network-
attached devices for any conditions that
warrant administrative attention. For
example all of the following devices can
use SNMP for managing devices on IP
networks:
• Network router
• Network switch
• Printer
• NAS server
• ADSL ISP router / modem
• Linux / UNIX / Windows servers
SNMP components
SNMP Manager
• A manager or management system
is a separate entity that is
responsible to communicate with
the SNMP agent implemented
network devices. This is typically a
computer that is used to run one or
more network management
systems.
• SNMP Manager’s key functions
• Queries agents
• Gets responses from agents
SNMP components…
Managed Devices
• A managed device or the network element is a part of the
network that requires some form of monitoring and
management
• For example: Routers, Switches, Servers, Workstations,
Printers etc.
SNMPAgent
• The agent is a program that is packaged within the network
element. Enabling the agent allows it to collect the
management information database from the device locally and
makes it available to the SNMP manager, when it is queried
for.
SNMP agent’s key functions
• Collects management information about its local environment.
• Stores and retrieves management information as defined in the
MIB.
• Signals an event to the manager.
• Acts as a proxy for some non–SNMP manageable network
node.
SNMP Architecture
• To perform its monitoring services, SNMP uses a distributed
architecture of management systems and agents and several
related components.
• Windows Server 2003 provides an SNMP agent that is
designed to be capable of interacting with any SNMP manager.
The following components are the building blocks of SNMP
and the Windows Server 2003 SNMP agent:
• SNMP management systems and agents
• Management Information Base (MIB)
• SNMP Messages
• SNMP Communities
SNMP Architecture…
Basic commands of SNMP
• The simplicity in information exchange has made the SNMP
as widely accepted protocol. The main reason being concise
set of commands, here are they listed below:
• GET: The GET operation is a request sent by the manager to
the managed device. It is performed to retrieve one or more
values from the managed device.
• GET NEXT: This operation is similar to the GET. The
significant difference is that the GET NEXT operation
retrieves the value of the next OID in the MIB tree.
• GET BULK: The GETBULK operation is used to retrieve
voluminous data from large MIB table.
BENEFITS
 Control: The benefits of running an SNMP-compliant
application include the abilities to prevent, detect, and correct
network-related issues
 Popularity: SNMP is virtually supported by every enterprise
network equipment manufacturer in the world.
 Efficiency :SNMP also utilizes the User Datagram Protocol
(UDP) to deliver packets called protocol data units (PDUs).
LIMITATIONS
 Simplicity: Because SNMP uses UDP as its transmission
protocol, it lacks many reliability and security issues.
 Security: Security has been a big concern with SNMPv1 and
SNMPv2. Neither provides adequate security features such as
management message authentication and encryption.
• Alternative :The Common Management Information Protocol
(CMIP) is another alternative to network management.
SNMP SECURITY
 Lacks authentication. Vulnerable to the variety of security
threats.
 Vulnerable to masquerading, modification of information,
time modifications, message sequencing and disclosures.
 Message sequence and timing modifications occurs when an
entity who is unauthorized reorders, delays, or copies and
later replays a message generated by an authorized entity.
Languages of SNMP
 Structure of Management Information (SMI)
Specifies the format used for defining managed objects that are
accessed via the SNMP protocol
 Abstract Syntax Notation One (ASN.1)
Used to define the format of SNMP messages and managed
objects (MIB modules) using an unambiguous data description
format
 Basic Encoding Rules (BER)
Used to encode the SNMP messages into a format suitable for
transmission across a network
CONCLUSION
• By implementing the SNMP technology, Ingenico has again
demonstrated its desire to provide customers with the best-
suited and most cost-effective solutions available.
• This widespread, light protocol is easy to deploy, and allows
Ingenico terminals to be integrated into an existing SNMP
environment if needed.
Thanks

More Related Content

What's hot

Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolNilantha Piyasiri
 
Simple Network Management Protocole
Simple Network Management ProtocoleSimple Network Management Protocole
Simple Network Management ProtocoleAmin Komeili
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Shahrukh Ali Khan
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocolGouasmia Zakaria
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoTFabMinds
 

What's hot (20)

Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Simple Network Management Protocole
Simple Network Management ProtocoleSimple Network Management Protocole
Simple Network Management Protocole
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
Protocol snmp
Protocol snmpProtocol snmp
Protocol snmp
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Osi model
Osi modelOsi model
Osi model
 
Subnetting
SubnettingSubnetting
Subnetting
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
internet protocols
internet protocolsinternet protocols
internet protocols
 

Similar to SNMP

5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptxAhmedAlRasheed18
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmpPalanivel Kuppusamy
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Managementjeronimored
 
group presentation
group presentationgroup presentation
group presentations1120099
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)Ramla Sheikh
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocolni35540
 
Project report
Project reportProject report
Project reportayush13bbm
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolAnupomShill
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...jeronimored
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Week10
Week10Week10
Week10Hayato
 

Similar to SNMP (20)

5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptx
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
group G
group Ggroup G
group G
 
a
aa
a
 
SNMP
SNMPSNMP
SNMP
 
group presentation
group presentationgroup presentation
group presentation
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Project report
Project reportProject report
Project report
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Network management
Network managementNetwork management
Network management
 
Week10
Week10Week10
Week10
 
Hp open view
Hp open viewHp open view
Hp open view
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 

More from OECLIB Odisha Electronics Control Library

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

SNMP

  • 1. www.oeclib.in Submitted By: Odisha Electronic Control Library Seminar On SNMP
  • 2. Introduction • The Simple Network Management Protocol (SNMP) is by far, the dominant protocol in network management. • A key reason for its widespread acceptance, besides being the chief Internet standard for network management is its relative simplicity.
  • 3. What is SNMP? • SNMP is used for collecting information from network devices like servers, switches, hubs, printers and routers on an Internet Protocol (IP) network. It is a popular protocol for network management. • It is a part of Transmission Control Protocol Internet Protocol (TCP⁄IP) protocol suite.
  • 4. SNMP Management • SNMP management has become the dominant standardized network management scheme in use today. • The SNMP set of standards provide a framework for the definition of management information along with a protocol for the exchange of that information. • The SNMP model assumes the existence of managers and agents.
  • 5. How does SNMP work? • The simple network management protocol (SNMP) use for monitoring of network- attached devices for any conditions that warrant administrative attention. For example all of the following devices can use SNMP for managing devices on IP networks: • Network router • Network switch • Printer • NAS server • ADSL ISP router / modem • Linux / UNIX / Windows servers
  • 6. SNMP components SNMP Manager • A manager or management system is a separate entity that is responsible to communicate with the SNMP agent implemented network devices. This is typically a computer that is used to run one or more network management systems. • SNMP Manager’s key functions • Queries agents • Gets responses from agents
  • 7. SNMP components… Managed Devices • A managed device or the network element is a part of the network that requires some form of monitoring and management • For example: Routers, Switches, Servers, Workstations, Printers etc. SNMPAgent • The agent is a program that is packaged within the network element. Enabling the agent allows it to collect the management information database from the device locally and makes it available to the SNMP manager, when it is queried for.
  • 8. SNMP agent’s key functions • Collects management information about its local environment. • Stores and retrieves management information as defined in the MIB. • Signals an event to the manager. • Acts as a proxy for some non–SNMP manageable network node.
  • 9. SNMP Architecture • To perform its monitoring services, SNMP uses a distributed architecture of management systems and agents and several related components. • Windows Server 2003 provides an SNMP agent that is designed to be capable of interacting with any SNMP manager. The following components are the building blocks of SNMP and the Windows Server 2003 SNMP agent: • SNMP management systems and agents • Management Information Base (MIB) • SNMP Messages • SNMP Communities
  • 11. Basic commands of SNMP • The simplicity in information exchange has made the SNMP as widely accepted protocol. The main reason being concise set of commands, here are they listed below: • GET: The GET operation is a request sent by the manager to the managed device. It is performed to retrieve one or more values from the managed device. • GET NEXT: This operation is similar to the GET. The significant difference is that the GET NEXT operation retrieves the value of the next OID in the MIB tree. • GET BULK: The GETBULK operation is used to retrieve voluminous data from large MIB table.
  • 12. BENEFITS  Control: The benefits of running an SNMP-compliant application include the abilities to prevent, detect, and correct network-related issues  Popularity: SNMP is virtually supported by every enterprise network equipment manufacturer in the world.  Efficiency :SNMP also utilizes the User Datagram Protocol (UDP) to deliver packets called protocol data units (PDUs).
  • 13. LIMITATIONS  Simplicity: Because SNMP uses UDP as its transmission protocol, it lacks many reliability and security issues.  Security: Security has been a big concern with SNMPv1 and SNMPv2. Neither provides adequate security features such as management message authentication and encryption. • Alternative :The Common Management Information Protocol (CMIP) is another alternative to network management.
  • 14. SNMP SECURITY  Lacks authentication. Vulnerable to the variety of security threats.  Vulnerable to masquerading, modification of information, time modifications, message sequencing and disclosures.  Message sequence and timing modifications occurs when an entity who is unauthorized reorders, delays, or copies and later replays a message generated by an authorized entity.
  • 15. Languages of SNMP  Structure of Management Information (SMI) Specifies the format used for defining managed objects that are accessed via the SNMP protocol  Abstract Syntax Notation One (ASN.1) Used to define the format of SNMP messages and managed objects (MIB modules) using an unambiguous data description format  Basic Encoding Rules (BER) Used to encode the SNMP messages into a format suitable for transmission across a network
  • 16. CONCLUSION • By implementing the SNMP technology, Ingenico has again demonstrated its desire to provide customers with the best- suited and most cost-effective solutions available. • This widespread, light protocol is easy to deploy, and allows Ingenico terminals to be integrated into an existing SNMP environment if needed.

Editor's Notes

  1. 1