SlideShare a Scribd company logo
1 of 48
CChhaapptteerr 2211 
NNeettwwoorrkk MMaannaaggeemmeenntt:: 
SSNNMMPP 
Objectives 
Upon completion you will be able to: 
• Understand the SNMP manager and the SNMP agent 
• Understand the roles of SMI and MIB in network management 
• Be familiar with SMI object attributes and encoding methods 
• Know how an MIB variable is accessed 
• Be familiar with the SNMP PDU and format 
TCP/IP Protocol Suite 1
21.1 CONCEPT 
SNMP defines a manager, usually a host, that ccoonnttrroollss aanndd mmoonniittoorrss aa 
sseett ooff aaggeennttss,, uussuuaallllyy rroouutteerrss.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
MMaannaaggeerrss aanndd AAggeennttss 
TCP/IP Protocol Suite 2
Figure 21.1 SNMP concept 
TCP/IP Protocol Suite 3
21.2 MANAGEMENT COMPONENTS 
SNMP requires the use of two other protocols: Structure ooff MMaannaaggeemmeenntt 
IInnffoorrmmaattiioonn (SSMMII) aanndd MMaannaaggeemmeenntt IInnffoorrmmaattiioonn BBaassee (MMIIBB).. NNeettwwoorrkk 
mmaannaaggeemmeenntt oonn tthhee IInntteerrnneett iiss ddoonnee tthhrroouugghh tthhee ccooooppeerraattiioonn ooff SSNNMMPP,, 
SSMMII,, aanndd MMIIBB.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
RRoollee ooff SSNNMMPP 
RRoollee ooff SSMMII 
RRoollee ooff MMIIBB 
AAnn AAnnaallooggyy 
AAnn OOvveerrvviieeww 
TCP/IP Protocol Suite 4
Figure 21.2 Components of network management on the Internet 
TCP/IP Protocol Suite 5
NNoottee:: 
SNMP defines the format of packets 
exchanged between a manager and an 
agent. It reads and changes the status 
(values) of objects (variables) in 
SNMP packets. 
TCP/IP Protocol Suite 6
NNoottee:: 
SMI defines the general rules for naming 
objects, defining object types (including 
range and length), and showing how to 
encode objects and values. SMI defines 
neither the number of objects an entity 
should manage, nor names the objects to 
be managed nor defines the association 
between the objects and their values. 
TCP/IP Protocol Suite 7
NNoottee:: 
MIB creates a collection of named 
objects, their types, and their 
relationships to each other in an entity 
to be managed. 
TCP/IP Protocol Suite 8
NNoottee:: 
We can compare the task of network 
management to the task of writing a 
program. 
❏ Both tasks need rules. In network management 
this is handled by SMI. 
❏ Both tasks need variable declarations. In network 
management this is handled by MIB. 
❏ Both tasks have actions performed by statements. 
In network management this is handled by SNMP. 
TCP/IP Protocol Suite 9
Figure 21.3 Management overview 
TCP/IP Protocol Suite 10
21.3 SMI 
SMI is a component used in network management. IItt nnaammeess oobbjjeeccttss,, 
ddeeffiinneess tthhee ttyyppee ooff ddaattaa tthhaatt ccaann bbee ssttoorreedd iinn aann oobbjjeecctt,, aanndd sshhoowwss hhooww 
ddaattaa ccaann bbee eennccooddeedd ffoorr ttrraannssmmiissssiioonn oovveerr tthhee nneettwwoorrkk 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
NNaammee 
TTyyppee 
EEnnccooddiinngg MMeetthhoodd 
TCP/IP Protocol Suite 11
Figure 21.4 Object attributes 
TCP/IP Protocol Suite 12
Figure 21.5 Object identifier 
TCP/IP Protocol Suite 13
NNoottee:: 
All objects managed by SNMP are 
given an object identifier. 
The object identifier always starts with 
1.3.6.1.2.1. 
TCP/IP Protocol Suite 14
Figure 21.6 Data type 
TCP/IP Protocol Suite 15
TTaabbllee 2211..11 DDaattaa ttyyppeess 
TCP/IP Protocol Suite 16
Figure 21.7 Conceptual data types 
TCP/IP Protocol Suite 17
Figure 21.8 Encoding format 
TCP/IP Protocol Suite 18
TTaabbllee 2211..22 CCooddeess ffoorr ddaattaa ttyyppeess 
TCP/IP Protocol Suite 19
Figure 21.9 Length format 
TCP/IP Protocol Suite 20
ExamplE 1 
Figure 21.10 shows how to define INTEGER 14. 
See Next Slide 
TCP/IP Protocol Suite 21
Figure 21.10 Example 1, INTEGER 14 
TCP/IP Protocol Suite 22
ExamplE 2 
Figure 21.11 shows how to define the OCTET STRING 
“HI.” 
See Next Slide 
TCP/IP Protocol Suite 23
Figure 21.11 Example 2, OCTET STRING “HI” 
TCP/IP Protocol Suite 24
ExamplE 3 
Figure 21.12 shows how to define ObjectIdentifier 
1.3.6.1 (iso.org.dod.internet). 
See Next Slide 
TCP/IP Protocol Suite 25
Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1 
TCP/IP Protocol Suite 26
ExamplE 4 
Figure 21.13 shows how to define IPAddress 
131.21.14.8. 
See Next Slide 
TCP/IP Protocol Suite 27
Figure 21.13 Example 4, IPAddress 131.21.14.8 
TCP/IP Protocol Suite 28
21.4 MIB 
MIB is a component used in network management. EEaacchh aaggeenntt hhaass iittss 
oowwnn MMIIBB,, aa ccoolllleeccttiioonn ooff aallll tthhee oobbjjeeccttss tthhaatt tthhee mmaannaaggeerr ccaann mmaannaaggee.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
AAcccceessssiinngg MMIIBB VVaarriiaabblleess 
LLeexxiiccooggrraapphhiicc OOrrddeerriinngg 
TCP/IP Protocol Suite 29
Figure 21.14 mib-2 
TCP/IP Protocol Suite 30
Figure 21.15 udp group 
TCP/IP Protocol Suite 31
Figure 21.16 udp variables and tables 
TCP/IP Protocol Suite 32
Figure 21.17 Indexes for udpTable 
TCP/IP Protocol Suite 33
Figure 21.18 Lexicographic ordering 
TCP/IP Protocol Suite 34
21.5 SNMP 
SNMP is an application program that allows 1) a mmaannaaggeerr ttoo rreettrriieevvee tthhee 
vvaalluuee ooff aann oobbjjeecctt ddeeffiinneedd iinn aann aaggeenntt;; 22)) aa mmaannaaggeerr ttoo ssttoorree aa vvaalluuee iinn 
aann oobbjjeecctt ddeeffiinneedd iinn aann aaggeenntt;; aanndd 33)) aann aaggeenntt ttoo sseenndd aann aallaarrmm mmeessssaaggee 
aabboouutt aann aabbnnoorrmmaall ssiittuuaattiioonn ttoo tthhee mmaannaaggeerr 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
PPDDUUss 
FFoorrmmaatt 
TCP/IP Protocol Suite 35
Figure 21.19 SNMP PDUs 
TCP/IP Protocol Suite 36
Figure 21.20 SNMP PDU format 
TCP/IP Protocol Suite 37
TTaabbllee 2211..33 TTyyppeess ooff eerrrroorrss 
TCP/IP Protocol Suite 38
21.6 MESSAGES 
A message in SNMP is made of four elements: vveerrssiioonn,, hheeaaddeerr,, sseeccuurriittyy 
ppaarraammeetteerrss,, aanndd ddaattaa ((wwhhiicchh iinncclluuddeess tthhee eennccooddeedd PPDDUU)).. 
TCP/IP Protocol Suite 39
Figure 21.21 SNMP message 
TCP/IP Protocol Suite 40
TTaabbllee 2211..44 CCooddeess ffoorr SSNNMMPP mmeessssaaggeess 
TCP/IP Protocol Suite 41
ExamplE 5 
In this example, a manager station (SNMP client) uses the 
GetRequest message to retrieve the number of UDP datagrams 
that a router has received. There is only one VarBind entity. 
The corresponding MIB variable related to this information is 
udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. 
The manager wants to retrieve a value (not to store a value), so 
the value defines a null entity. Figure 21.22 shows the 
conceptual view of the packet showing the hierarchical nature 
of sequences. We have used white and color boxes for the 
sequence and a gray one for the PDU. 
See Next Slide 
TCP/IP Protocol Suite 42
ExamplE 5 
The VarBind list has only one VarBind. The variable is of type 
06 and length 09. The value is of type 05 and length 00. The 
whole is a sequence of length 0D (13). The VarBind list is also 
a sequence of length 0F (15). The GetRequest PDU is of length 
1D (29). Now we have three OCTET STRINGs related to 
security parameter, security model, and flags. Then we have 
two integers defining maximum size (1024) and message ID 
(64). The header is a sequence of length 12, which we left 
blank for simplicity. There is one integer, version (version 3). 
The whole message is a sequence of 52 bytes. Figure 21.23 
shows the actual message sent by the manager station (client) 
to the agent (server). 
See Next Slide 
TCP/IP Protocol Suite 43
Figure 21.22 Example 5 
TCP/IP Protocol Suite 44
Figure 21.23 GetRequest message 
TCP/IP Protocol Suite 45
21.7 UDP PORTS 
SNMP uses the services of UDP on two well-kknnoowwnn ppoorrttss,, 116611 aanndd 116622.. 
TThhee wweellll--kknnoowwnn ppoorrtt 116611 iiss uusseedd bbyy tthhee sseerrvveerr ((aaggeenntt)),, aanndd tthhee wweellll-- 
kknnoowwnn ppoorrtt 116622 iiss uusseedd bbyy tthhee cclliieenntt ((mmaannaaggeerr)).. 
TCP/IP Protocol Suite 46
Figure 21.24 Port numbers for SNMP 
TCP/IP Protocol Suite 47
21.8 SECURITY 
The main difference between SNMPv3 and SNMPv2 iiss tthhee eennhhaanncceedd 
sseeccuurriittyy.. SSNNMMPPvv33 pprroovviiddeess ttwwoo ttyyppeess ooff sseeccuurriittyy:: ggeenneerraall aanndd ssppeecciiffiicc.. 
SSNNMMPPvv33 pprroovviiddeess mmeessssaaggee aauutthheennttiiccaattiioonn,, pprriivvaaccyy,, aanndd mmaannaaggeerr 
aauutthhoorriizzaattiioonn.. 
TCP/IP Protocol Suite 48

More Related Content

What's hot (20)

Chap 25 multimedia
Chap 25 multimediaChap 25 multimedia
Chap 25 multimedia
 
Chap 07 arp & rarp
Chap 07 arp & rarpChap 07 arp & rarp
Chap 07 arp & rarp
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Ch21
Ch21Ch21
Ch21
 
Chap 11
Chap 11Chap 11
Chap 11
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 
Meeting 12. pop, imap.ppt
Meeting 12. pop, imap.pptMeeting 12. pop, imap.ppt
Meeting 12. pop, imap.ppt
 
Meeting 5.1 : telnet
Meeting 5.1 : telnetMeeting 5.1 : telnet
Meeting 5.1 : telnet
 

Viewers also liked

How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
Lori deRoin
 
Internet Security
Internet SecurityInternet Security
Internet Security
Manoj Sahu
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
www.sciencepowerpoint.com
 

Viewers also liked (12)

Chap 26 vpn
Chap 26 vpnChap 26 vpn
Chap 26 vpn
 
How Email Works storyboarad_cartoon
How Email Works storyboarad_cartoonHow Email Works storyboarad_cartoon
How Email Works storyboarad_cartoon
 
Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Chap 03 underlying technology
Chap 03 underlying technologyChap 03 underlying technology
Chap 03 underlying technology
 
Chap 15 multicasting
Chap 15 multicastingChap 15 multicasting
Chap 15 multicasting
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
Virus Identification Visual Quiz, Viruses, Types of Viruses Biology Lesson Po...
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 

Similar to Chap 21 snmp

FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
useonlyfortech140
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
Mohd Arif
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 
PowerPoint_merge (2).pdf
PowerPoint_merge (2).pdfPowerPoint_merge (2).pdf
PowerPoint_merge (2).pdf
ssuser3b47e6
 

Similar to Chap 21 snmp (20)

Snmp
SnmpSnmp
Snmp
 
Ch28
Ch28Ch28
Ch28
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
ch28 (1).ppt
ch28 (1).pptch28 (1).ppt
ch28 (1).ppt
 
CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.ppt
 
ch28.ppt
ch28.pptch28.ppt
ch28.ppt
 
MininetasSDNPlatform.pdf
MininetasSDNPlatform.pdfMininetasSDNPlatform.pdf
MininetasSDNPlatform.pdf
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
 
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 
Ch23
Ch23Ch23
Ch23
 
I010315760
I010315760I010315760
I010315760
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
PowerPoint_merge (2).pdf
PowerPoint_merge (2).pdfPowerPoint_merge (2).pdf
PowerPoint_merge (2).pdf
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 
PowerPoint_merge.ppt
PowerPoint_merge.pptPowerPoint_merge.ppt
PowerPoint_merge.ppt
 
Report (2)
Report (2)Report (2)
Report (2)
 
Rfc2576
Rfc2576Rfc2576
Rfc2576
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Recently uploaded (20)

Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Chap 21 snmp

  • 1. CChhaapptteerr 2211 NNeettwwoorrkk MMaannaaggeemmeenntt:: SSNNMMPP Objectives Upon completion you will be able to: • Understand the SNMP manager and the SNMP agent • Understand the roles of SMI and MIB in network management • Be familiar with SMI object attributes and encoding methods • Know how an MIB variable is accessed • Be familiar with the SNMP PDU and format TCP/IP Protocol Suite 1
  • 2. 21.1 CONCEPT SNMP defines a manager, usually a host, that ccoonnttrroollss aanndd mmoonniittoorrss aa sseett ooff aaggeennttss,, uussuuaallllyy rroouutteerrss.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: MMaannaaggeerrss aanndd AAggeennttss TCP/IP Protocol Suite 2
  • 3. Figure 21.1 SNMP concept TCP/IP Protocol Suite 3
  • 4. 21.2 MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: Structure ooff MMaannaaggeemmeenntt IInnffoorrmmaattiioonn (SSMMII) aanndd MMaannaaggeemmeenntt IInnffoorrmmaattiioonn BBaassee (MMIIBB).. NNeettwwoorrkk mmaannaaggeemmeenntt oonn tthhee IInntteerrnneett iiss ddoonnee tthhrroouugghh tthhee ccooooppeerraattiioonn ooff SSNNMMPP,, SSMMII,, aanndd MMIIBB.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: RRoollee ooff SSNNMMPP RRoollee ooff SSMMII RRoollee ooff MMIIBB AAnn AAnnaallooggyy AAnn OOvveerrvviieeww TCP/IP Protocol Suite 4
  • 5. Figure 21.2 Components of network management on the Internet TCP/IP Protocol Suite 5
  • 6. NNoottee:: SNMP defines the format of packets exchanged between a manager and an agent. It reads and changes the status (values) of objects (variables) in SNMP packets. TCP/IP Protocol Suite 6
  • 7. NNoottee:: SMI defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. SMI defines neither the number of objects an entity should manage, nor names the objects to be managed nor defines the association between the objects and their values. TCP/IP Protocol Suite 7
  • 8. NNoottee:: MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. TCP/IP Protocol Suite 8
  • 9. NNoottee:: We can compare the task of network management to the task of writing a program. ❏ Both tasks need rules. In network management this is handled by SMI. ❏ Both tasks need variable declarations. In network management this is handled by MIB. ❏ Both tasks have actions performed by statements. In network management this is handled by SNMP. TCP/IP Protocol Suite 9
  • 10. Figure 21.3 Management overview TCP/IP Protocol Suite 10
  • 11. 21.3 SMI SMI is a component used in network management. IItt nnaammeess oobbjjeeccttss,, ddeeffiinneess tthhee ttyyppee ooff ddaattaa tthhaatt ccaann bbee ssttoorreedd iinn aann oobbjjeecctt,, aanndd sshhoowwss hhooww ddaattaa ccaann bbee eennccooddeedd ffoorr ttrraannssmmiissssiioonn oovveerr tthhee nneettwwoorrkk TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: NNaammee TTyyppee EEnnccooddiinngg MMeetthhoodd TCP/IP Protocol Suite 11
  • 12. Figure 21.4 Object attributes TCP/IP Protocol Suite 12
  • 13. Figure 21.5 Object identifier TCP/IP Protocol Suite 13
  • 14. NNoottee:: All objects managed by SNMP are given an object identifier. The object identifier always starts with 1.3.6.1.2.1. TCP/IP Protocol Suite 14
  • 15. Figure 21.6 Data type TCP/IP Protocol Suite 15
  • 16. TTaabbllee 2211..11 DDaattaa ttyyppeess TCP/IP Protocol Suite 16
  • 17. Figure 21.7 Conceptual data types TCP/IP Protocol Suite 17
  • 18. Figure 21.8 Encoding format TCP/IP Protocol Suite 18
  • 19. TTaabbllee 2211..22 CCooddeess ffoorr ddaattaa ttyyppeess TCP/IP Protocol Suite 19
  • 20. Figure 21.9 Length format TCP/IP Protocol Suite 20
  • 21. ExamplE 1 Figure 21.10 shows how to define INTEGER 14. See Next Slide TCP/IP Protocol Suite 21
  • 22. Figure 21.10 Example 1, INTEGER 14 TCP/IP Protocol Suite 22
  • 23. ExamplE 2 Figure 21.11 shows how to define the OCTET STRING “HI.” See Next Slide TCP/IP Protocol Suite 23
  • 24. Figure 21.11 Example 2, OCTET STRING “HI” TCP/IP Protocol Suite 24
  • 25. ExamplE 3 Figure 21.12 shows how to define ObjectIdentifier 1.3.6.1 (iso.org.dod.internet). See Next Slide TCP/IP Protocol Suite 25
  • 26. Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1 TCP/IP Protocol Suite 26
  • 27. ExamplE 4 Figure 21.13 shows how to define IPAddress 131.21.14.8. See Next Slide TCP/IP Protocol Suite 27
  • 28. Figure 21.13 Example 4, IPAddress 131.21.14.8 TCP/IP Protocol Suite 28
  • 29. 21.4 MIB MIB is a component used in network management. EEaacchh aaggeenntt hhaass iittss oowwnn MMIIBB,, aa ccoolllleeccttiioonn ooff aallll tthhee oobbjjeeccttss tthhaatt tthhee mmaannaaggeerr ccaann mmaannaaggee.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: AAcccceessssiinngg MMIIBB VVaarriiaabblleess LLeexxiiccooggrraapphhiicc OOrrddeerriinngg TCP/IP Protocol Suite 29
  • 30. Figure 21.14 mib-2 TCP/IP Protocol Suite 30
  • 31. Figure 21.15 udp group TCP/IP Protocol Suite 31
  • 32. Figure 21.16 udp variables and tables TCP/IP Protocol Suite 32
  • 33. Figure 21.17 Indexes for udpTable TCP/IP Protocol Suite 33
  • 34. Figure 21.18 Lexicographic ordering TCP/IP Protocol Suite 34
  • 35. 21.5 SNMP SNMP is an application program that allows 1) a mmaannaaggeerr ttoo rreettrriieevvee tthhee vvaalluuee ooff aann oobbjjeecctt ddeeffiinneedd iinn aann aaggeenntt;; 22)) aa mmaannaaggeerr ttoo ssttoorree aa vvaalluuee iinn aann oobbjjeecctt ddeeffiinneedd iinn aann aaggeenntt;; aanndd 33)) aann aaggeenntt ttoo sseenndd aann aallaarrmm mmeessssaaggee aabboouutt aann aabbnnoorrmmaall ssiittuuaattiioonn ttoo tthhee mmaannaaggeerr TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: PPDDUUss FFoorrmmaatt TCP/IP Protocol Suite 35
  • 36. Figure 21.19 SNMP PDUs TCP/IP Protocol Suite 36
  • 37. Figure 21.20 SNMP PDU format TCP/IP Protocol Suite 37
  • 38. TTaabbllee 2211..33 TTyyppeess ooff eerrrroorrss TCP/IP Protocol Suite 38
  • 39. 21.6 MESSAGES A message in SNMP is made of four elements: vveerrssiioonn,, hheeaaddeerr,, sseeccuurriittyy ppaarraammeetteerrss,, aanndd ddaattaa ((wwhhiicchh iinncclluuddeess tthhee eennccooddeedd PPDDUU)).. TCP/IP Protocol Suite 39
  • 40. Figure 21.21 SNMP message TCP/IP Protocol Suite 40
  • 41. TTaabbllee 2211..44 CCooddeess ffoorr SSNNMMPP mmeessssaaggeess TCP/IP Protocol Suite 41
  • 42. ExamplE 5 In this example, a manager station (SNMP client) uses the GetRequest message to retrieve the number of UDP datagrams that a router has received. There is only one VarBind entity. The corresponding MIB variable related to this information is udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve a value (not to store a value), so the value defines a null entity. Figure 21.22 shows the conceptual view of the packet showing the hierarchical nature of sequences. We have used white and color boxes for the sequence and a gray one for the PDU. See Next Slide TCP/IP Protocol Suite 42
  • 43. ExamplE 5 The VarBind list has only one VarBind. The variable is of type 06 and length 09. The value is of type 05 and length 00. The whole is a sequence of length 0D (13). The VarBind list is also a sequence of length 0F (15). The GetRequest PDU is of length 1D (29). Now we have three OCTET STRINGs related to security parameter, security model, and flags. Then we have two integers defining maximum size (1024) and message ID (64). The header is a sequence of length 12, which we left blank for simplicity. There is one integer, version (version 3). The whole message is a sequence of 52 bytes. Figure 21.23 shows the actual message sent by the manager station (client) to the agent (server). See Next Slide TCP/IP Protocol Suite 43
  • 44. Figure 21.22 Example 5 TCP/IP Protocol Suite 44
  • 45. Figure 21.23 GetRequest message TCP/IP Protocol Suite 45
  • 46. 21.7 UDP PORTS SNMP uses the services of UDP on two well-kknnoowwnn ppoorrttss,, 116611 aanndd 116622.. TThhee wweellll--kknnoowwnn ppoorrtt 116611 iiss uusseedd bbyy tthhee sseerrvveerr ((aaggeenntt)),, aanndd tthhee wweellll-- kknnoowwnn ppoorrtt 116622 iiss uusseedd bbyy tthhee cclliieenntt ((mmaannaaggeerr)).. TCP/IP Protocol Suite 46
  • 47. Figure 21.24 Port numbers for SNMP TCP/IP Protocol Suite 47
  • 48. 21.8 SECURITY The main difference between SNMPv3 and SNMPv2 iiss tthhee eennhhaanncceedd sseeccuurriittyy.. SSNNMMPPvv33 pprroovviiddeess ttwwoo ttyyppeess ooff sseeccuurriittyy:: ggeenneerraall aanndd ssppeecciiffiicc.. SSNNMMPPvv33 pprroovviiddeess mmeessssaaggee aauutthheennttiiccaattiioonn,, pprriivvaaccyy,, aanndd mmaannaaggeerr aauutthhoorriizzaattiioonn.. TCP/IP Protocol Suite 48