SlideShare a Scribd company logo
1 of 14
Download to read offline
1
Network Management 9-1
Chapter 9
Network Management
Computer Networking:
A Top Down Approach
Featuring the Internet,
3rd edition.
Jim Kurose, Keith Ross
Addison-Wesley, July
2004.
A note on the use of these ppt slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you can add, modify, and delete slides
(including this one) and slide content to suit your needs. They obviously
represent a lot of work on our part. In return for use, we only ask the
following:
 If you use these slides (e.g., in a class) in substantially unaltered form,
that you mention their source (after all, we’d like people to use our book!)
 If you post any slides in substantially unaltered form on a www site, that
you note that they are adapted from (or perhaps identical to) our slides, and
note our copyright of this material.
Thanks and enjoy! JFK/KWR
All material copyright 1996-2004
J.F Kurose and K.W. Ross, All Rights Reserved
Network Management 9-2
Chapter 9: Network Management
Chapter goals:
 introduction to network management
 motivation
 major components
 Internet network management framework
 MIB: management information base
 SMI: data definition language
 SNMP: protocol for network management
 security and administration
 presentation services: ASN.1
2
Network Management 9-3
Chapter 9 outline
 What is network management?
 Internet-standard management framework
 Structure of Management Information: SMI
 Management Information Base: MIB
 SNMP Protocol Operations and Transport Mappings
 Security and Administration
 ASN.1
Network Management 9-4
What is network management?
 autonomous systems (aka “network”): 100s or 1000s
of interacting hardware/software components
 other complex systems requiring monitoring, control:
 jet airplane
 nuclear power plant
 others?
"Network management includes the deployment, integration
and coordination of the hardware, software, and human
elements to monitor, test, poll, configure, analyze, evaluate,
and control the network and element resources to meet the
real-time, operational performance, and Quality of Service
requirements at a reasonable cost."
This image cannot currently be displayed.
3
Network Management 9-5
Infrastructure for network management
agent data
agent data
agent data
agent data
managed device
managed device
managed device
managed device
managing
entity
data
network
management
protocol
definitions:
managed devices contain
managed objects whose
data is gathered into a
Management Information
Base (MIB)
managing entity
Network Management 9-6
Network Management standards
OSI CMIP
 Common Management
Information Protocol
 designed 1980’s: the
unifying net
management standard
 too slowly
standardized
SNMP: Simple Network
Management Protocol
 Internet roots (SGMP)
 started simple
 deployed, adopted rapidly
 growth: size, complexity
 currently: SNMP V3
 de facto network
management standard
4
Network Management 9-7
Chapter 9 outline
 What is network management?
 Internet-standard management framework
 Structure of Management Information: SMI
 Management Information Base: MIB
 SNMP Protocol Operations and Transport Mappings
 Security and Administration
 ASN.1
Network Management 9-8
SNMP overview: 4 key parts
 Management information base (MIB):
 distributed information store of network
management data
 Structure of Management Information (SMI):
 data definition language for MIB objects
 SNMP protocol
 convey manager<->managed object info, commands
 security, administration capabilities
 major addition in SNMPv3
5
Network Management 9-9
SMI: data definition language
Purpose: syntax, semantics of
management data well-
defined, unambiguous
 base data types:
 straightforward, boring
 OBJECT-TYPE
 data type, status,
semantics of managed
object
 MODULE-IDENTITY
 groups related objects
into MIB module
Basic Data Types
INTEGER
Integer32
Unsigned32
OCTET STRING
OBJECT IDENTIFIED
IPaddress
Counter32
Counter64
Guage32
Time Ticks
Opaque
Network Management 9-10
SNMP MIB
OBJECT TYPE:
OBJECT TYPE:OBJECT TYPE:
objects specified via SMI
OBJECT-TYPE construct
MIB module specified via SMI
MODULE-IDENTITY
(100 standardized MIBs, more vendor-specific)
MODULE
6
Network Management 9-11
SMI: Object, module examples
OBJECT-TYPE: ipInDelivers MODULE-IDENTITY: ipMIB
ipInDelivers OBJECT TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
“The total number of input
datagrams successfully
delivered to IP user-
protocols (including ICMP)”
::= { ip 9}
ipMIB MODULE-IDENTITY
LAST-UPDATED “941101000Z”
ORGANZATION “IETF SNPv2
Working Group”
CONTACT-INFO
“ Keith McCloghrie
……”
DESCRIPTION
“The MIB module for managing IP
and ICMP implementations, but
excluding their management of
IP routes.”
REVISION “019331000Z”
………
::= {mib-2 48}
Network Management 9-12
MIB example: UDP module
Object ID Name Type Comments
1.3.6.1.2.1.7.1 UDPInDatagrams Counter32 total # datagrams delivered
at this node
1.3.6.1.2.1.7.2 UDPNoPorts Counter32 # underliverable datagrams
no app at portl
1.3.6.1.2.1.7.3 UDInErrors Counter32 # undeliverable datagrams
all other reasons
1.3.6.1.2.1.7.4 UDPOutDatagrams Counter32 # datagrams sent
1.3.6.1.2.1.7.5 udpTable SEQUENCE one entry for each port
in use by app, gives port #
and IP address
7
Network Management 9-13
SNMP Naming
question: how to name every possible standard object
(protocol, data, more..) in every possible network
standard??
answer: ISO Object Identifier tree:
 hierarchical naming of all objects
 each branchpoint has name, number
1.3.6.1.2.1.7.1
ISO
ISO-ident. Org.
US DoD
Internet
udpInDatagrams
UDP
MIB2
management
Network Management 9-14
Check out www.alvestrand.no/harald/objectid/top.html
OSI
Object
Identifier
Tree
8
Network Management 9-15
SNMP protocol
Two ways to convey MIB info, commands:
agent data
Managed device
managing
entity
response
agent data
Managed device
managing
entity
trap msg
request
request/response mode trap mode
Network Management 9-16
SNMP protocol: message types
GetRequest
GetNextRequest
GetBulkRequest
Mgr-to-agent: “get me data”
(instance,next in list, block)
Message type Function
InformRequest Mgr-to-Mgr: here’s MIB value
SetRequest Mgr-to-agent: set MIB value
Response Agent-to-mgr: value, response to
Request
Trap Agent-to-mgr: inform manager
of exceptional event
9
Network Management 9-17
SNMP protocol: message formats
Network Management 9-18
SNMP security and administration
 encryption: DES-encrypt SNMP message
 authentication: compute, send MIC(m,k):
compute hash (MIC) over message (m),
secret shared key (k)
 protection against playback: use nonce
 view-based access control
 SNMP entity maintains database of access
rights, policies for various users
 database itself accessible as managed object!
10
Network Management 9-19
Chapter 9 outline
 What is network management?
 Internet-standard management framework
 Structure of Management Information: SMI
 Management Information Base: MIB
 SNMP Protocol Operations and Transport Mappings
 Security and Administration
 The presentation problem: ASN.1
Network Management 9-20
The presentation problem
Q: does perfect memory-to-memory copy
solve “the communication problem”?
A: not always!
problem: different data format, storage conventions
struct {
char code;
int x;
} test;
test.x = 256;
test.code=‘a’
a
00000001
00000011
a
00000011
00000001
test.code
test.x
test.code
test.x
host 1 format host 2 format
11
Network Management 9-21
A real-life presentation problem:
aging 60’s
hippie
2004 teenagergrandma
Network Management 9-22
Presentation problem: potential solutions
1. Sender learns receiver’s format. Sender translates
into receiver’s format. Sender sends.
– real-world analogy?
– pros and cons?
2. Sender sends. Receiver learns sender’s format.
Receiver translate into receiver-local format
– real-world-analogy
– pros and cons?
3. Sender translates host-independent format. Sends.
Receiver translates to receiver-local format.
– real-world analogy?
– pros and cons?
12
Network Management 9-23
Solving the presentation problem
1. Translate local-host format to host-independent format
2. Transmit data in host-independent format
3. Translate host-independent format to remote-host
format
aging 60’s
hippie 2004 teenagergrandma
Network Management 9-24
ASN.1: Abstract Syntax Notation 1
 ISO standard X.680
 used extensively in Internet
 like eating vegetables, knowing this “good for you”!
 defined data types, object constructors
 like SMI
 BER: Basic Encoding Rules
 specify how ASN.1-defined data objects to be
transmitted
 each transmitted object has Type, Length, Value
(TLV) encoding
13
Network Management 9-25
TLV Encoding
Idea: transmitted data is self-identifying
 T: data type, one of ASN.1-defined types
 L: length of data in bytes
 V: value of data, encoded according to ASN.1
standard
1
2
3
4
5
6
9
Boolean
Integer
Bitstring
Octet string
Null
Object Identifier
Real
Tag Value Type
Network Management 9-26
TLV
encoding:
example
Value, 5 octets (chars)
Length, 5 bytes
Type=4, octet string
Value, 259
Length, 2 bytes
Type=2, integer
14
Network Management 9-27
Network Management: summary
 network management
 extremely important: 80% of network “cost”
 ASN.1 for data description
 SNMP protocol as a tool for conveying
information
 Network management: more art than science
 what to measure/monitor
 how to respond to failures?
 alarm correlation/filtering?

More Related Content

Viewers also liked

Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la ns
Khánh Ghẻ
 
Chapter2 application layer
Chapter2 application layerChapter2 application layer
Chapter2 application layer
Khánh Ghẻ
 
Chapter3 transport layer
Chapter3 transport layerChapter3 transport layer
Chapter3 transport layer
Khánh Ghẻ
 
Chapter6 wireless and mobile networks
Chapter6 wireless and mobile networksChapter6 wireless and mobile networks
Chapter6 wireless and mobile networks
Khánh Ghẻ
 
Chapter4 network layer
Chapter4 network layerChapter4 network layer
Chapter4 network layer
Khánh Ghẻ
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
getvibha
 
Chapter7 multimedia
Chapter7 multimediaChapter7 multimedia
Chapter7 multimedia
Khánh Ghẻ
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
asadkhan1327
 

Viewers also liked (20)

Chapter6
Chapter6Chapter6
Chapter6
 
Netshoes redessociais
Netshoes redessociaisNetshoes redessociais
Netshoes redessociais
 
common admission test mock paper
common admission test mock papercommon admission test mock paper
common admission test mock paper
 
Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la ns
 
Chapter2 application layer
Chapter2 application layerChapter2 application layer
Chapter2 application layer
 
Netshoes redessociais
Netshoes redessociaisNetshoes redessociais
Netshoes redessociais
 
Defusión cognitiva
Defusión cognitivaDefusión cognitiva
Defusión cognitiva
 
Api pinkan
Api pinkanApi pinkan
Api pinkan
 
Chapter3 transport layer
Chapter3 transport layerChapter3 transport layer
Chapter3 transport layer
 
Sanlúcar-Our town
Sanlúcar-Our townSanlúcar-Our town
Sanlúcar-Our town
 
Chapter1 introduction
Chapter1 introductionChapter1 introduction
Chapter1 introduction
 
Chapter6 wireless and mobile networks
Chapter6 wireless and mobile networksChapter6 wireless and mobile networks
Chapter6 wireless and mobile networks
 
Chapter4 network layer
Chapter4 network layerChapter4 network layer
Chapter4 network layer
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
Mindfulness
MindfulnessMindfulness
Mindfulness
 
Chapter7 multimedia
Chapter7 multimediaChapter7 multimedia
Chapter7 multimedia
 
Social conditioning
Social conditioning Social conditioning
Social conditioning
 
NEMATODE GLANDS AND THIER SECRETION
NEMATODE GLANDS AND THIER SECRETIONNEMATODE GLANDS AND THIER SECRETION
NEMATODE GLANDS AND THIER SECRETION
 
mycoviruses and pathogensis
mycoviruses and pathogensismycoviruses and pathogensis
mycoviruses and pathogensis
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 

Similar to Chapter9 network managment-3ed

Chapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docx
tiffanyd4
 
Chapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docx
mccormicknadine86
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docxCOMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
noel23456789
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
Tara Smith
 

Similar to Chapter9 network managment-3ed (20)

Chapter 9 v6.0
Chapter 9 v6.0Chapter 9 v6.0
Chapter 9 v6.0
 
Chapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docx
 
Chapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docxChapter 9Network ManagementComputer Networking A Top Down A.docx
Chapter 9Network ManagementComputer Networking A Top Down A.docx
 
Datacom Section 8 - NetworkManagment.ppt
Datacom Section 8 - NetworkManagment.pptDatacom Section 8 - NetworkManagment.ppt
Datacom Section 8 - NetworkManagment.ppt
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
UDP Report
UDP ReportUDP Report
UDP Report
 
Mini Project- Virtual Network Project
Mini Project- Virtual Network ProjectMini Project- Virtual Network Project
Mini Project- Virtual Network Project
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
DDS Advanced Tutorial - OMG June 2013 Berlin MeetingDDS Advanced Tutorial - OMG June 2013 Berlin Meeting
DDS Advanced Tutorial - OMG June 2013 Berlin Meeting
 
Simple Network Management Protocole
Simple Network Management ProtocoleSimple Network Management Protocole
Simple Network Management Protocole
 
Significance
SignificanceSignificance
Significance
 
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docxCOMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Creating a Machine Learning Model on the Cloud
Creating a Machine Learning Model on the CloudCreating a Machine Learning Model on the Cloud
Creating a Machine Learning Model on the Cloud
 
Distributed Systems in Data Engineering
Distributed Systems in Data EngineeringDistributed Systems in Data Engineering
Distributed Systems in Data Engineering
 
A164 enterprise javascript ibm node sdk
A164 enterprise javascript ibm node sdkA164 enterprise javascript ibm node sdk
A164 enterprise javascript ibm node sdk
 
Uma SunilKumar Resume
Uma SunilKumar ResumeUma SunilKumar Resume
Uma SunilKumar Resume
 
IncQuery-D: Incremental Queries in the Cloud
IncQuery-D: Incremental Queries in the CloudIncQuery-D: Incremental Queries in the Cloud
IncQuery-D: Incremental Queries in the Cloud
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
 
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
 

Chapter9 network managment-3ed

  • 1. 1 Network Management 9-1 Chapter 9 Network Management Computer Networking: A Top Down Approach Featuring the Internet, 3rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we’d like people to use our book!)  If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2004 J.F Kurose and K.W. Ross, All Rights Reserved Network Management 9-2 Chapter 9: Network Management Chapter goals:  introduction to network management  motivation  major components  Internet network management framework  MIB: management information base  SMI: data definition language  SNMP: protocol for network management  security and administration  presentation services: ASN.1
  • 2. 2 Network Management 9-3 Chapter 9 outline  What is network management?  Internet-standard management framework  Structure of Management Information: SMI  Management Information Base: MIB  SNMP Protocol Operations and Transport Mappings  Security and Administration  ASN.1 Network Management 9-4 What is network management?  autonomous systems (aka “network”): 100s or 1000s of interacting hardware/software components  other complex systems requiring monitoring, control:  jet airplane  nuclear power plant  others? "Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost." This image cannot currently be displayed.
  • 3. 3 Network Management 9-5 Infrastructure for network management agent data agent data agent data agent data managed device managed device managed device managed device managing entity data network management protocol definitions: managed devices contain managed objects whose data is gathered into a Management Information Base (MIB) managing entity Network Management 9-6 Network Management standards OSI CMIP  Common Management Information Protocol  designed 1980’s: the unifying net management standard  too slowly standardized SNMP: Simple Network Management Protocol  Internet roots (SGMP)  started simple  deployed, adopted rapidly  growth: size, complexity  currently: SNMP V3  de facto network management standard
  • 4. 4 Network Management 9-7 Chapter 9 outline  What is network management?  Internet-standard management framework  Structure of Management Information: SMI  Management Information Base: MIB  SNMP Protocol Operations and Transport Mappings  Security and Administration  ASN.1 Network Management 9-8 SNMP overview: 4 key parts  Management information base (MIB):  distributed information store of network management data  Structure of Management Information (SMI):  data definition language for MIB objects  SNMP protocol  convey manager<->managed object info, commands  security, administration capabilities  major addition in SNMPv3
  • 5. 5 Network Management 9-9 SMI: data definition language Purpose: syntax, semantics of management data well- defined, unambiguous  base data types:  straightforward, boring  OBJECT-TYPE  data type, status, semantics of managed object  MODULE-IDENTITY  groups related objects into MIB module Basic Data Types INTEGER Integer32 Unsigned32 OCTET STRING OBJECT IDENTIFIED IPaddress Counter32 Counter64 Guage32 Time Ticks Opaque Network Management 9-10 SNMP MIB OBJECT TYPE: OBJECT TYPE:OBJECT TYPE: objects specified via SMI OBJECT-TYPE construct MIB module specified via SMI MODULE-IDENTITY (100 standardized MIBs, more vendor-specific) MODULE
  • 6. 6 Network Management 9-11 SMI: Object, module examples OBJECT-TYPE: ipInDelivers MODULE-IDENTITY: ipMIB ipInDelivers OBJECT TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION “The total number of input datagrams successfully delivered to IP user- protocols (including ICMP)” ::= { ip 9} ipMIB MODULE-IDENTITY LAST-UPDATED “941101000Z” ORGANZATION “IETF SNPv2 Working Group” CONTACT-INFO “ Keith McCloghrie ……” DESCRIPTION “The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes.” REVISION “019331000Z” ……… ::= {mib-2 48} Network Management 9-12 MIB example: UDP module Object ID Name Type Comments 1.3.6.1.2.1.7.1 UDPInDatagrams Counter32 total # datagrams delivered at this node 1.3.6.1.2.1.7.2 UDPNoPorts Counter32 # underliverable datagrams no app at portl 1.3.6.1.2.1.7.3 UDInErrors Counter32 # undeliverable datagrams all other reasons 1.3.6.1.2.1.7.4 UDPOutDatagrams Counter32 # datagrams sent 1.3.6.1.2.1.7.5 udpTable SEQUENCE one entry for each port in use by app, gives port # and IP address
  • 7. 7 Network Management 9-13 SNMP Naming question: how to name every possible standard object (protocol, data, more..) in every possible network standard?? answer: ISO Object Identifier tree:  hierarchical naming of all objects  each branchpoint has name, number 1.3.6.1.2.1.7.1 ISO ISO-ident. Org. US DoD Internet udpInDatagrams UDP MIB2 management Network Management 9-14 Check out www.alvestrand.no/harald/objectid/top.html OSI Object Identifier Tree
  • 8. 8 Network Management 9-15 SNMP protocol Two ways to convey MIB info, commands: agent data Managed device managing entity response agent data Managed device managing entity trap msg request request/response mode trap mode Network Management 9-16 SNMP protocol: message types GetRequest GetNextRequest GetBulkRequest Mgr-to-agent: “get me data” (instance,next in list, block) Message type Function InformRequest Mgr-to-Mgr: here’s MIB value SetRequest Mgr-to-agent: set MIB value Response Agent-to-mgr: value, response to Request Trap Agent-to-mgr: inform manager of exceptional event
  • 9. 9 Network Management 9-17 SNMP protocol: message formats Network Management 9-18 SNMP security and administration  encryption: DES-encrypt SNMP message  authentication: compute, send MIC(m,k): compute hash (MIC) over message (m), secret shared key (k)  protection against playback: use nonce  view-based access control  SNMP entity maintains database of access rights, policies for various users  database itself accessible as managed object!
  • 10. 10 Network Management 9-19 Chapter 9 outline  What is network management?  Internet-standard management framework  Structure of Management Information: SMI  Management Information Base: MIB  SNMP Protocol Operations and Transport Mappings  Security and Administration  The presentation problem: ASN.1 Network Management 9-20 The presentation problem Q: does perfect memory-to-memory copy solve “the communication problem”? A: not always! problem: different data format, storage conventions struct { char code; int x; } test; test.x = 256; test.code=‘a’ a 00000001 00000011 a 00000011 00000001 test.code test.x test.code test.x host 1 format host 2 format
  • 11. 11 Network Management 9-21 A real-life presentation problem: aging 60’s hippie 2004 teenagergrandma Network Management 9-22 Presentation problem: potential solutions 1. Sender learns receiver’s format. Sender translates into receiver’s format. Sender sends. – real-world analogy? – pros and cons? 2. Sender sends. Receiver learns sender’s format. Receiver translate into receiver-local format – real-world-analogy – pros and cons? 3. Sender translates host-independent format. Sends. Receiver translates to receiver-local format. – real-world analogy? – pros and cons?
  • 12. 12 Network Management 9-23 Solving the presentation problem 1. Translate local-host format to host-independent format 2. Transmit data in host-independent format 3. Translate host-independent format to remote-host format aging 60’s hippie 2004 teenagergrandma Network Management 9-24 ASN.1: Abstract Syntax Notation 1  ISO standard X.680  used extensively in Internet  like eating vegetables, knowing this “good for you”!  defined data types, object constructors  like SMI  BER: Basic Encoding Rules  specify how ASN.1-defined data objects to be transmitted  each transmitted object has Type, Length, Value (TLV) encoding
  • 13. 13 Network Management 9-25 TLV Encoding Idea: transmitted data is self-identifying  T: data type, one of ASN.1-defined types  L: length of data in bytes  V: value of data, encoded according to ASN.1 standard 1 2 3 4 5 6 9 Boolean Integer Bitstring Octet string Null Object Identifier Real Tag Value Type Network Management 9-26 TLV encoding: example Value, 5 octets (chars) Length, 5 bytes Type=4, octet string Value, 259 Length, 2 bytes Type=2, integer
  • 14. 14 Network Management 9-27 Network Management: summary  network management  extremely important: 80% of network “cost”  ASN.1 for data description  SNMP protocol as a tool for conveying information  Network management: more art than science  what to measure/monitor  how to respond to failures?  alarm correlation/filtering?