2. Network Management
Definition:-
Network management is a discipline that deals with operations,
management and monitoring voice and data on network.
Network Management contains five functional areas :-
1) Configuration management
2) Fault management
3) Performance management
4) Accounting management
5) Security management
3. Network Management
Case history of Network Management:-
Network management is more than just managing a network .Network
management is also referred to as operations administration,
maintenance and provisioning. Each organization has his own network
engineer to deal with network. Even some organization has number of
specialists of networks to manage their larger networks. The main
purpose of managing network is to provide services to customer and
every organization did not want to compromise on customer services
because they are important assets of their earning. We discus here
some case histories of network management that gives us an idea of
how network specialist deals with network in different situation.
4. Network Management
Case history of Network Management:-
Following are case histories of Network Management:-
1) Importance of topology
2) Centrally managed network issues
3) Transaction delay in client server network
4) Service impact in End-to-End service of customer
5) Some common network problems.
5. Network Management
Case history of Network Management:-
1) Importance of topology :-
Each corporate network contains several minicomputers and
about 100 desktop workstation. Sometime network goes down without
any apparent reason all user in company start claiming about network
failure so here the problem arise. In this way we have to check whole
network topology being used and check whether the wire connected
properly. If you did not use a proper topology then it will be very
difficult for you to find reason of network failure it means that
topology is very important for network management operations.
6. Network Management
Case history of Network Management:-
2) Centrally managed network issue:-
Centrally managed network are
the networks in which we centralize our resources on network. It is
most common e.g. Sharing a printer on network it centrally managed
network there is a DC (Domain controller) that provide login services
to all clients connected with it. For e.g. an organization has thousands
of user login through DC. If DC crash due to some reason then we
single user can login on computer here is a problem occurred how can
user performs their tasks on computers. This problem is solved by
configuring an ADC (Additional Domain Controller) in network when DC
crashes then ADC start services to user without any problem.
8. Network Management
Case history of Network Management:-
3) Transaction delay in client server network :-
In current nation and global enterprise
organizations application server provide services to thousands of client. Most
common example is banking system where every day thousands of people make
transaction and sometime transaction delay due to load on application server and
this delay problem is solved by adding more servers in networks.
4) Service impact in End-to-End service customer:-
End-to-End services means identify the customer
problem before customer complaints .for e.g. in an optical fiber transport network
that carries thousands of channels, a failure of single component affects service of
hundreds of customer. An End-to-End services break down is to be traced to failure
of single or multiple network elements by finding root cause of failure.
9. Network Management
Case history of Network Management:-
5) Some common network problems :-
The most common and serious problem in network are
connectivity failure and are handled under the fault management. Fault is generally
interpreted as failure in accessing network and system by users. Network failure
may occur due to physical problem like wire cut, not connected properly, NIC
adapter failure etc. network problem also occur due to load on network for
example sending heavy traffic on low bandwidth channel. Some logical problem may
also cause network failure like IP and MAC address of machines in the network
conflict IP's is also most common problem. All these kind of problem are the
responsibilities of network engineer. Some time when no problem is identified by
network engineer after a lot of attempts then he has only one option left that is
on/off machines.
10. Network Management
GOALS OF NETWORK MANAGEMENT:-
Following are the goals of network management:
Network Provisioning: - Network provisioning is the first goal of
network management. Network provisioning mean planning and
designing of networks, before implementing network we first plan
network and then start designing network.
Network Operations :- After network provisioning that deals with
network planning and design we start different operation on network
to find failure to configure properly ,make it efficient and secure we
performs network operation like fault management, performance
management, configuration management and security management .
Network Maintenance :- In the network maintenance all equipment
and configuration setting are maintained and improve time-to-time
because networks are not fixed they are growing day by day so be
careful to add new network in existing networks through maintenance
11. Network Management
NETWORK MANAGEMENT MODELS :-
The OSI network model is an ISO standard and is almost complete of all the model .It is well
structured and addresses all aspect of management. OSI network management model
comprise of four models, each model has its own specifications.
1) Organization model:
The organizational model describe the components of network system their
functions and their infrastructure. It defines term object, agent and manager network
elements like hub, switch, router, bridge etc. They can be classified into managed and
unmanaged object, The managed object have a management process running in them
called an agent while in unmanaged object have no management process is running. For
e.g. if you buy managed hub you don't need to configure it but if you buy unmanaged hub
then you need to configure it before use. No agent (management process) in running in
unmanaged objects. The manager manages the managed objects there is a data base in
manager but not in agent. The manager queries and receive information from agent
about management data and store in its data base called MDB (management database) in
two tier model, there is only one manager and one agent and MDB while in three tier
model there is an intermediate layer acts as both agent and manager. This layer query
information as a manger and store it is MDB and as an agent forward this information to
upper managers.
14. Network Management
2) Information model:
Information model deals with the structure and management of
information. information model contain SMI (structure of management
information) and MIB (management information base).SMI describes how
management information is structured and MIB deals with storages of
management information, SMI deals with structure of information which is
easy to understand and MIB perform storing operation on this information,
MIB used by both manager and agent MIB associated with agent called
"Agent MIB "and MIB associated with manager called "manager MIB" The
manager MIB contain information of whole network while agent MIB
contain only local information of agent, manager has both MDB and MIB
it is important to distinguish between MDB and MIB. MDB is a real data
base and contain the real measured value while MIB is virtual database
and contain the information necessary for process to change information.
For e.g. a hub is added in network information about hub ports and other
information of hub parameter are stored in MIB while the actual value like
'16'ports is stored in MDB.
15. Network Management
3) Communication model:
we have learnt that information is exchanged between
agent and manager but we don't deals how this information will be
exchanged so communication model deals how information will be
exchanged between agent and manager, Three aspects need to be
addressed in the communication of information between two
entities like .
i) Transport medium of message exchange
ii) message format of communication
iii) Actual message
16. Network Management
4) Functional model: functional model consist of five model
i) Fault management
ii) Configuration management
iii) Performance management
iv) Accounting management
v) Security management
Fault management model deals with detection and isolation of the
problem causing the failure in the network configuration
management address the setting and changing the configuration of
network object, performance management is connected with the
performance behavior of network. Security management deals with
securing network from external attacks, Accounting management
deals with costing the network equipment’s.
17. Network Management
SNMP: - Simple Network Management Protocol:
The responsibility of network administrator is to collect accurate
information about whole network and server infrastructure. There
are large number of options and tool available for gathering
information about whole network and SNMP is one of them most
widely used tool SNMP is a protocol is implemented on the
application layer of the networking layers.
The protocol was created as a way of gathering information from
different networks in a constant manner there are different
versions of SNMP protocol the most widely used version is SNMPv1
but it is in secure means that SNMPv1 is not secure. SNMPv3 is more
advanced version providing secure environment SNMP mainly
contain devices like SNMP agent and SNMP manager. SNMP agent is
programs that can gather information about network organize it in
to predefine entries and respond to SNMP protocol.
18. Network Management
SNMP: - Simple Network Management Protocol:
The responsibility of network administrator is to collect accurate
information about whole network and server infrastructure. There
are large number of options and tool available for gathering
information about whole network and SNMP is one of them most
widely used tool SNMP is a protocol is implemented on the
application layer of the networking layers.
The protocol was created as a way of gathering information from
different networks in a constant manner there are different
versions of SNMP protocol the most widely used version is SNMPv1
but it is in secure means that SNMPv1 is not secure. SNMPv3 is more
advanced version providing secure environment SNMP mainly
contain devices like SNMP agent and SNMP manager. SNMP agent is
programs that can gather information about network organize it in
to predefine entries and respond to SNMP protocol.
19. Network Management
SNMP: - Simple Network Management Protocol:
SNMP manager query information from agent, all the information
stored in MIB (management information base) by SNMP agent, each
information stored in MIB contain a unique OID (object identifier)
through SNMP manager Query information.
20. Network Management
SNMP protocol commands:
Following are some command used in SNMP protocol to manage
information’s.
GET: ‘Get’ command is sent by a manager to an agent to request the
value of specific information, this request answered that is sent back to
the manager.
GET NEXT: ‘Get next’ command allow manager to request the next
sequential information in MIB, this is a way in which you don’t worry
about structure of MIB.
Set: ’Set’ command is used by a manager to an agent in order to
change the value of information in MIB; it is also called write options
defined by protocol.
Get Bulk: ‘Get bulk’ command is to use by manager to get multiple
get next request.
Response: Response command is use by an agent to send information
to manager.
21. Network Management
SNMP protocol commands:
Trap: ‘Trap’ command is sent by an agent to manager to inform
manager about what event to happening on their networking
devices.
Inform: To confirm the receipt of trap, manager send ‘inform’
command to an agent.
22. Network Management
SNMP Versions:-
SNMPv1: This is first version of SNMP which is not secure.
SNMPv2: This is revised protocol which include enhancement of
SNMPv1 in areas of protocol packet types, MIB structure, it is
also not secure.
SNMPv3: SNMPv3 is secure version of SNMP there is no functional
differences between different versions of SNMP, it provides
authentication, authorization, privacy security services.
SNMP Proxy Server: SNMP proxy server is implemented as a front
end module to the SNMPv2 manager for communication with
SNMPv1 agent. SNMPv2 manager can not directly communicate
with SNMPv1 agent so proxy server is as intermediate between
SNMPv2 manager and SNMPv1 agent. SNMP proxy server perform
same sort of conversions so that communication become easier
between different versions of SNMP manager and agent.
24. Network Management
NETWORK MANAGEMENT TOOLS:
Different network management tools are available in
operating system for managing network and you can also add some
other tools can be categories into three major monitoring tools.
1) Status Monitoring tools:
27. Network Management
Public IP: Public IP provide access to internet, any computer having public IP
can get access to internet, it means that public IP can be accessed by anyone in
the world public IP provide communication over WAN (wide area network)
IANA(Internet Assigned Number Authority) provide following public IP
.
Class A = 1-----------126
Class B = 128--------191
Class C = 192--------223
Class D = 224--------239
Class E = 240--------254
Private IP: Different organization use private IP addresses to make their
private networks private IP can’t be accessed anyone outside the private network.
Private IP’S are used to make LAN in different organization like school and
different companies, for providing secure environment to organizations IANA give
private IP ranges which can be used by different organization to make their
network secure. Following are ranges of private IP address provided by IANA.
10.0.0.0---------------------------------10.255.255.255
172.16.0.0------------------------------172.31.255.255
192.168.0.0----------------------------192.168.255.255
28. Network Management
ACCESS LISTS (Acls): Access lists (Acls) are basically a set of commands group
together by a name or number that is used to filter traffic entering or leaving
interface.
I) Standard Access lists: Standard access list is simple; it filters packets on
the bases of source and destination address of packet. You can permit or deny
traffic on the bases of source and destination address.
II) Extended Access lists: An extended access list is more powerful than a
standard access list because extended access list filter packets on the source
address port number, protocols, destination address and other parameters.
30. Network Management
RMON (Remote Monitoring):
RMON is a process of remotely monitoring and managing
information between agent and manager, the device which is used
for remote monitoring is called monitor or “Probe”; a monitor or
Probe is devices that perform monitoring operation on whole
network, there may be multiple Probes in a network depend up on
the size of a network. The main goal of remote monitoring devices
is “proactively monitoring” it means that remote monitoring
devices always check whole network events like packet size, error
rate, failure, traffic over network so when there is any possibility of
occurring any kind of error remote monitoring devices start
diagnosing the problem and solve it before any issue occurred,
there are different RMON version working at different layers of
network.
31. Network Management
RMON1: RMON1 standard is focused at layer2 (Data link layer) and
provide link layer statistics on a variety of ways, it also generate
alarms when threshold are crossed, it also has the ability to filter
packets on network .Following are the components of RMON1.
Statistics group: it contains the statistics of RMON devices means
that statistics group contains measurements of all problems
monitored by RMON devices.
History group: The history group contains periodical records of data
from different types of network media.
Alarm group: Alarm group is responsible for generating alarms when
any event in network cross threshold.
Host group: The host group contains the information of all hosts in
a network like their IP, MAC addresses.
Filter group: Filter group perform packet filtering operations on
packets moving in a network.
Event group: The event group controls the generation and
notification of events from different devices on network.
32. Network Management
Web Based Management:
Web based management means different
networking devices like hubs, switches, routers, wireless access points can be
accessed by using an embedded web based interface which allow users to manage
any devices from anywhere on the network through a standard browser such as
Netscape, Navigator or Microsoft internet explorer. The web browser acts as a
universal access tool and can communicate directly with the device using HTTP
protocol.