SlideShare a Scribd company logo
28.1
Chapter 28
Network Management:
SNMP
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
28.2
28-1 NETWORK MANAGEMENT SYSTEM28-1 NETWORK MANAGEMENT SYSTEM
We can say that the functions performed by aWe can say that the functions performed by a
network management system can be divided into fivenetwork management system can be divided into five
broad categories: configuration management, faultbroad categories: configuration management, fault
management, performance management, securitymanagement, performance management, security
management, and accounting management.management, and accounting management.
Configuration Management
Fault Management
Performance Management
Security Management
Accounting Management
Topics discussed in this section:Topics discussed in this section:
28.3
Figure 28.1 Functions of a network management system
28.4
28-2 SIMPLE NETWORK MANAGEMENT28-2 SIMPLE NETWORK MANAGEMENT
PROTOCOL (SNMP)PROTOCOL (SNMP)
The Simple Network Management Protocol (SNMP) is aThe Simple Network Management Protocol (SNMP) is a
framework for managing devices in an internet usingframework for managing devices in an internet using
the TCP/IP protocol suite. It provides a set ofthe TCP/IP protocol suite. It provides a set of
fundamental operations for monitoring and maintainingfundamental operations for monitoring and maintaining
an internet.an internet.
Concept
Management Components
Structure of Management Information (SMI)
Management Information Base (MIB)
SNMP
Topics discussed in this section:Topics discussed in this section:
28.5
Figure 28.2 SNMP concept
28.6
Figure 28.3 Components of network management on the Internet
28.7
SNMP defines the format of packets
exchanged between a manager and
an agent. It reads and changes the
status (values) of objects (variables)
in SNMP packets.
Note
28.8
SMI defines the general rules for naming
objects, defining object types (including
range and length), and showing how to
encode objects and values. SMI does
not define the number of objects an
entity should manage or name the
objects to be managed or define the
association between the objects and
their values.
Note
28.9
MIB creates a collection of named
objects, their types, and their
relationships to each other
in an entity to be managed.
Note
28.10
We can compare the task of network
management to the task of writing a program.
❏ Both tasks need rules. In network
management this is handled by SMI.
❏ Both tasks need variable declarations. In
network management this is handled by MIB.
❏ Both tasks have actions performed by
statements. In network management this is
handled by SNMP.
Note
28.11
Figure 28.4 Management overview
28.12
Figure 28.5 Object attributes
28.13
Figure 28.6 Object identifier
28.14
All objects managed by SNMP are given
an object identifier.
The object identifier always starts with
1.3.6.1.2.1.
Note
28.15
Figure 28.7 Data type
28.16
Table 28.1 Data types
28.17
Figure 28.8 Conceptual data types
28.18
Figure 28.9 Encoding format
28.19
Table 28.2 Codes for data types
28.20
Figure 28.10 Length format
28.21
Figure 28.11 shows how to define INTEGER 14.
Figure 28.11 Example 28.1, INTEGER 14
Example 28.1
28.22
Figure 28.12 shows how to define the OCTET STRING
“HI”.
Figure 28.12 Example 28.2, OCTET STRING “HI”
Example 28.2
28.23
Figure 28.13 shows how to define ObjectIdentifier
1.3.6.1 (iso.org.dod.internet).
Figure 28.13 Example 28.3, ObjectIdentifier 1.3.6.1
Example 28.3
28.24
Figure 28.14 shows how to define IPAddress 131.21.14.8..
Figure 28.14 Example 28.4, IPAddress 131.21.14.8.
Example 28.4
28.25
Figure 28.15 mib-2
28.26
Figure 28.16 udp group
28.27
Figure 28.17 udp variables and tables
28.28
Figure 28.18 Indexes for udpTable
28.29
Figure 28.19 Lexicographic ordering
28.30
Figure 28.20 SNMP PDUs
28.31
Figure 28.21 SNMP PDU format
28.32
Table 28.3 Types of errors
28.33
Figure 28.22 SNMP message
28.34
Table 28.4 Codes for SNMP messages
28.35
In this example, a manager station (SNMP client) uses
the GetRequest message to retrieve the number of UDP
datagrams that a router has received. There is only one
VarBind entity. The corresponding MIB variable related
to this information is udpInDatagrams with the object
identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve
a value (not to store a value), so the value defines a null
entity. Figure 28.23 shows the conceptual view of the
packet and the hierarchical nature of sequences. We have
used white and colored boxes for the sequences and a
gray one for the PDU. The VarBind list has only one
VarBind.
Example 28.5
28.36
The variable is of type 06 and length 09. The value is of
type 05 and length 00. The whole VarBind is a sequence
of length 0D (13). The VarBind list is also a sequence of
length 0F (15). The GetRequest PDU is of length ID (29).
Now we have three OCTET STRINGs related to the
security parameter, security model, and flags. Then we
have two integers defining maximum size (1024) and
message ID (64). The header is a sequence of length 12,
which we left blank for simplicity. There is one integer,
version (version 3). The whole message is a sequence of
52 bytes. Figure 28.24 shows the actual message sent by
the manager station (client) to the agent (server).
Example 28.5 (continued)
28.37
Figure 28.23 Example 28.5
28.38
Figure 28.24 GetRequest message
28.39
Figure 28.25 Port numbers for SNMP

More Related Content

What's hot

22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
Ahmar Hashmi
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
Ahmar Hashmi
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
jignash
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
Ahmar Hashmi
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
02 network models
02  network models02  network models
02 network models
Meenakshi Paul
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
Ahmar Hashmi
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
sumit gyawali
 
Data link layer
Data link layerData link layer
Data link layer
st2112
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
vtunotesbysree
 
Computer network
Computer networkComputer network
Computer network
Gaurav Rawat
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
Manisha Keim
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
Mahesh Kumar Chelimilla
 
Data link layer
Data link layerData link layer
Data link layer
Hassanein Alwan
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
Faisal Mehmood
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
Noctorous Jamal
 

What's hot (20)

22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
Ch31
Ch31Ch31
Ch31
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Ch27
Ch27Ch27
Ch27
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
02 network models
02  network models02  network models
02 network models
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
Data link layer
Data link layerData link layer
Data link layer
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
Computer network
Computer networkComputer network
Computer network
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
Data link layer
Data link layerData link layer
Data link layer
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 

Similar to 28 Network Management_SNMP

Chapter 28
Chapter 28Chapter 28
Chapter 28
Faisal Mehmood
 
CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.ppt
serne
 
ch28.ppt
ch28.pptch28.ppt
ch28.ppt
hussam53
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
Noctorous Jamal
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
useonlyfortech140
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Abdullaziz Tagawy
 
Snmp
SnmpSnmp
Snmp
singh7599
 
A simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gtsA simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gts
wissem hammouda
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
Hamdamboy (함담보이)
 
TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptx
WangRoof
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and SimulationAutomation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
inventionjournals
 
snmp
snmpsnmp
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Jaipal Dhobale
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
Djadja Sardjana
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
TanzeelGill
 

Similar to 28 Network Management_SNMP (20)

Chapter 28
Chapter 28Chapter 28
Chapter 28
 
ch28 (1).ppt
ch28 (1).pptch28 (1).ppt
ch28 (1).ppt
 
CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.ppt
 
ch28.ppt
ch28.pptch28.ppt
ch28.ppt
 
Ch23
Ch23Ch23
Ch23
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Snmp
SnmpSnmp
Snmp
 
A simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gtsA simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gts
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
TELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptxTELE25892-4.3 802.11 MAC Architecture.pptx
TELE25892-4.3 802.11 MAC Architecture.pptx
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and SimulationAutomation of Sub-Netting Problems Using Mathematical Modeling and Simulation
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulation
 
snmp
snmpsnmp
snmp
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
Snmp
SnmpSnmp
Snmp
 

More from Ahmar Hashmi

31 Network Security
31 Network Security31 Network Security
31 Network Security
Ahmar Hashmi
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
Ahmar Hashmi
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
Ahmar Hashmi
 
25 DNS
25 DNS25 DNS
25 DNS
Ahmar Hashmi
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
Ahmar Hashmi
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
Ahmar Hashmi
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
Ahmar Hashmi
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
Ahmar Hashmi
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
Ahmar Hashmi
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
Ahmar Hashmi
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
Ahmar Hashmi
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
Ahmar Hashmi
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
Ahmar Hashmi
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
Ahmar Hashmi
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
Ahmar Hashmi
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
Ahmar Hashmi
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
Ahmar Hashmi
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
Ahmar Hashmi
 
08 Switching
08 Switching08 Switching
08 Switching
Ahmar Hashmi
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission Media
Ahmar Hashmi
 

More from Ahmar Hashmi (20)

31 Network Security
31 Network Security31 Network Security
31 Network Security
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
 
25 DNS
25 DNS25 DNS
25 DNS
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
 
08 Switching
08 Switching08 Switching
08 Switching
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission Media
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 

28 Network Management_SNMP

  • 1. 28.1 Chapter 28 Network Management: SNMP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 28.2 28-1 NETWORK MANAGEMENT SYSTEM28-1 NETWORK MANAGEMENT SYSTEM We can say that the functions performed by aWe can say that the functions performed by a network management system can be divided into fivenetwork management system can be divided into five broad categories: configuration management, faultbroad categories: configuration management, fault management, performance management, securitymanagement, performance management, security management, and accounting management.management, and accounting management. Configuration Management Fault Management Performance Management Security Management Accounting Management Topics discussed in this section:Topics discussed in this section:
  • 3. 28.3 Figure 28.1 Functions of a network management system
  • 4. 28.4 28-2 SIMPLE NETWORK MANAGEMENT28-2 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)PROTOCOL (SNMP) The Simple Network Management Protocol (SNMP) is aThe Simple Network Management Protocol (SNMP) is a framework for managing devices in an internet usingframework for managing devices in an internet using the TCP/IP protocol suite. It provides a set ofthe TCP/IP protocol suite. It provides a set of fundamental operations for monitoring and maintainingfundamental operations for monitoring and maintaining an internet.an internet. Concept Management Components Structure of Management Information (SMI) Management Information Base (MIB) SNMP Topics discussed in this section:Topics discussed in this section:
  • 6. 28.6 Figure 28.3 Components of network management on the Internet
  • 7. 28.7 SNMP defines the format of packets exchanged between a manager and an agent. It reads and changes the status (values) of objects (variables) in SNMP packets. Note
  • 8. 28.8 SMI defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. SMI does not define the number of objects an entity should manage or name the objects to be managed or define the association between the objects and their values. Note
  • 9. 28.9 MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. Note
  • 10. 28.10 We can compare the task of network management to the task of writing a program. ❏ Both tasks need rules. In network management this is handled by SMI. ❏ Both tasks need variable declarations. In network management this is handled by MIB. ❏ Both tasks have actions performed by statements. In network management this is handled by SNMP. Note
  • 14. 28.14 All objects managed by SNMP are given an object identifier. The object identifier always starts with 1.3.6.1.2.1. Note
  • 19. 28.19 Table 28.2 Codes for data types
  • 21. 28.21 Figure 28.11 shows how to define INTEGER 14. Figure 28.11 Example 28.1, INTEGER 14 Example 28.1
  • 22. 28.22 Figure 28.12 shows how to define the OCTET STRING “HI”. Figure 28.12 Example 28.2, OCTET STRING “HI” Example 28.2
  • 23. 28.23 Figure 28.13 shows how to define ObjectIdentifier 1.3.6.1 (iso.org.dod.internet). Figure 28.13 Example 28.3, ObjectIdentifier 1.3.6.1 Example 28.3
  • 24. 28.24 Figure 28.14 shows how to define IPAddress 131.21.14.8.. Figure 28.14 Example 28.4, IPAddress 131.21.14.8. Example 28.4
  • 27. 28.27 Figure 28.17 udp variables and tables
  • 34. 28.34 Table 28.4 Codes for SNMP messages
  • 35. 28.35 In this example, a manager station (SNMP client) uses the GetRequest message to retrieve the number of UDP datagrams that a router has received. There is only one VarBind entity. The corresponding MIB variable related to this information is udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve a value (not to store a value), so the value defines a null entity. Figure 28.23 shows the conceptual view of the packet and the hierarchical nature of sequences. We have used white and colored boxes for the sequences and a gray one for the PDU. The VarBind list has only one VarBind. Example 28.5
  • 36. 28.36 The variable is of type 06 and length 09. The value is of type 05 and length 00. The whole VarBind is a sequence of length 0D (13). The VarBind list is also a sequence of length 0F (15). The GetRequest PDU is of length ID (29). Now we have three OCTET STRINGs related to the security parameter, security model, and flags. Then we have two integers defining maximum size (1024) and message ID (64). The header is a sequence of length 12, which we left blank for simplicity. There is one integer, version (version 3). The whole message is a sequence of 52 bytes. Figure 28.24 shows the actual message sent by the manager station (client) to the agent (server). Example 28.5 (continued)
  • 39. 28.39 Figure 28.25 Port numbers for SNMP