SlideShare a Scribd company logo
NETWORK MANAGEMENT
• NETWORK MANAGEMENT can be defined as
monitoring, testing, configuring and trouble shooting
network components to meet a set of requirements
defined by an organization.
• Set of requirements include the smooth, efficient
operation of the network that provides the
predefined quality of service for users.
• Functions of Network Management System
- Configuration management
- Fault management
- Performance management
- Security management
- Accounting management
SNMP- Simple Network Management Protocol
• The SNMP is a framework for managing devices in an
internet using the TCP/IP protocol suite.
• It provides a set of fundamental operations for
monitoring and maintaining an internet devices.
• Concept: SNMP uses the concept of manager and
agent.
SNMP- Managers and Agents
• A management station, called a manager, is a host
computer that runs the SNMP client program.
• A managed station, called as an agent, is a router (or a
host) that runs the SNMP server program.
• Management is achieved through simple interaction
between a manager and an agent.
• Management with SNMP is based on 3 basic idea.
1) A manager checks an agent by requesting
information in the form of variables that reflects the
behavior of the agent.
2) A manager forces an agent to perform a task by
resetting values of variables in the agent database.
3) An agent contributes to the management process by
warning the manager of an unusual situation (reboot).
MANAGEMENT Components
• To do the management task, SNMP uses two other
protocols: Structure of Management Information (SMI)
and Management Information Base (MIB).
• Means, Management on the Internet is done through the
cooperation of the three protocols SNMP, SMI and MIB.
MANAGEMENT Components
Role of SNMP
• It defines the format of the packet to be sent from a manager
to an agent and vice versa.
• It also interprets the result and creates statistics.
• The packets exchanged contain the object (variable) names
and their status (values).
• SNMP is responsible for reading and changing these values.
Role of SMI
• It defines the general rules for naming objects, defining
object types (including range and length), and showing how
to encode objects and values.
• SMI does not define the number of objects an entity should
manage or name the objects to be managed or define the
association between the objects and their values.
MANAGEMENT Components
Role of MIB
• For each entity to be managed, this protocol must define the
number of objects, name them according to the rules defined
by SMI, and associate a type to each named object.
• MIB creates a set of objects defined for each entity similar to
a database.
An Analogy
• We can compare the task of network management to the
task of writing a program.
- both tasks need rules, in network management this is
handled by SMI.
- both tasks need variable declaration, in network
management this is handled by MIB.
- both tasks have actions performed by statements, in
network management this is handled by SNMP.
MANAGEMENT Components
Structure of Management Information (SMI)
• The SMI, version 2 (SMIv2) is a component for network
management. Performs the functions such as
- To name objects.
- To define the type of data that can be stored in an object.
- To show how to encode data for transmission over the
network.
• SMI is guideline for SNMP, it emphasizes three attributes to
handle an object: name, data type and encoding method.
Structure of SMI
Name
• The SMI, requires that each managed object (such as a
router, a variable in a router, a value) have a unique name.
• To name objects globally, SMI uses an “Object Identifier”,
which is a hierarchical identifier based on tree structure.
• Tree structure starts with an unnamed root, each object can
be defined by using a sequence of integers separated by dots
(used by SNMP).
• Tree structure can also define an object by using a sequence
of textual names separated by dots (used by people).
- for example:
iso.org.dod.internet.mgmt.mib 1.3.6.1.2.1
The objects that are used in SNMP are located under mib
object, so their identifiers always starts with 1.3.6.1.2.1
Structure of SMI
Name
Structure of SMI
Type of data
• The second attribute of an object is the type of data stored in it.
• To define the data type, SMI uses fundamental Abstract
Syntax Notation 1 (ASN.1) definitions and adds some new
definitions i.e. SMI is both a subset and superset of ASN.1.
• It has 2 categories of data types: simple and structured.
Structure of SMI
Type of data
• Simple data type: the first five are from ASN.1; next seven
are defined by SMI.
Type Size Description
INTEGER 4 bytes An integer with a value between -231
and 231
-1
Integer32 4 bytes Same as INTEGER
Unsigned32 4 bytes Unsigned with value between 0 and 232
-1
OCTECT STRING Variable Byte string up to 65,535 bytes long
OBJECT
IDENTIFIER
Variable An Object Identifier
IPAddress 4 bytes An IP Address made of 4 integers
Counter32 4 bytes An Integer whose value can be incremented from 0 to 232
; when
it reaches its maximum value, it wraps back to 0
Counter64 8 bytes 64-bit counter
Gauge32 4 bytes Same as Counter32, but when it reaches its maximum value, it
does not wrap; it remains there until it is reset.
TimeTicks 4 bytes A counting value that records time in 1/100 second
BITS A string of bits
Opaque Variable Un interpreted string
Structure of SMI
Type of data
• Structured data type: SMI defines two structured data types-
Sequence and Sequence of.
• Sequence: it is a combination of simple data types, not
necessarily same type. It is like the concept of struct in C.
• Sequence of: it is a combination of simple data types all of
same type. It is like the concept of array in C.
Structure of SMI
Data Encoding Method
• SMI uses standard, Basic Encoding Rules (BER), to encode
data to be transmitted over the network.
• BER specifies each piece of data be encoded in triplet format:
tag, length and value.
• Tag: it is a 1 byte field that defines the type of data. It consist
of 3 subfields: class (2bits), format (1bit) and number (5bits).
- Class field defines the scope of the data: four classes are
defined: Universal (00), application wide (01), context specific
(10) and private (11).
Structure of SMI
Data Encoding Method
• The Universal (00) data types are taken from ASN.1
(INTEGER, OCTECT STRING, and ObectIdentifier).
• The Application wide (01) are added by SMI (IPAddress,
Counter, Gauge and TimeTicks).
• The 5 context-specific (10) data types have meanings
that may change from one protocol to another.
• The private (11) data types are vendor specific.
• The format subfield indicates whether the data are
simple (0) or structured (1).
• The number subfield further divides simple or structured
data into subgroups for example: in the universal class,
with simple format, INTEGER has a value of 2, OCTECT
STRING has a value of 4 and so on.
Structure of SMI
Data Encoding Method
• Length: it is 1 or more bytes. If it is 1 byte, the MSB is 0,
the other 7 bits defines the length of data. If it is more
than 1 byte, the MSB of the first byte must be 1 and
other 7 bits defines the number of bytes needed to define
the length.
• Value: it codes the value of the data according to the
rules defined in BER
0
Structure of SMI
Data Encoding Method
• Following table shows the data types and their tags in binary
and Hexadecimal numbers.
Data Type Class Format Number Tag
(Binary)
Tag
(Hex)
INTEGER 00 0 00010 00000010 02
OCTECT STRING 00 0 00100 00000100 04
OBJECT IDENTIFIER 00 0 00110 00000110 06
NULL 00 0 00101 00000101 05
Sequence, Sequence of 00 1 10000 00110000 30
IPAddress 01 0 00000 01000000 40
Counter 01 0 00001 01000001 41
Gauge 01 0 00010 01000010 42
TimeTicks 01 0 00011 01000011 43
Opaque 01 0 00100 01000100 44
Structure of SMI
Data Encoding Method
• Just to show how these three fields: tag, length and value
are used to define objects, for example: how to define
INTEGER 14.
• Another example: how to define OCTECT STRING “HI”.
MIB (Management Information Base)
MIB Version 2 (MIB2) is a second component used in network
management.
• Each agent has its own MIB2, which is a collection of all
objects that the manager can manage.
• The objects in MIB2 are categorized under 10 different
groups: system, interface, address translation, ip, icmp, tcp,
udp, egp, transmission and snmp.
• These groups are under MIB2 object in the object identifier
tree. Each group has defined variables and/ or tables.
MIB (Management Information Base)
Following is a brief description of some of the objects.
• sys: system object defines general information about the node
(system) such as name, location, and lifetime.
• if: interface object defines information about all the interfaces of
the node including interface no. physical address and IP address.
• at: address translation object defines information about the ARP
table.
• ip: this object defines information related to IP (routing table, IP
address).
• icmp: this object defines information about the ICMP (no. of
packets sent and received and total errors created).
• tcp: this object defines information about the TCP (connection
table, time-out value, no. of ports and no. of packets sent and
received ).
• udp: this object defines information about the UDP ( no. of ports
and no. of packets sent and received ).
• Snmp: this object defines information about SNMP (itself).
MIB (Management Information Base)
Accessing MIB variables.
• Simple variables: to access the simple variables, we use the id of
the group followed by the id of the variable. Following figure shows
how to access each variable.
For example: we use the group udp, then variables under udp group
can be accessed as follows.
udpInDatagrams 1.3.6.1.2.1.7.1
udpNoPorts 1.3.6.1.2.1.7.2
udpInErrors 1.3.6.1.2.1.7.3
SNMP (Simple Network Management Protocol)
SNMP uses both SMI and MIB in Internet network management. It is
an application program that allows
1. A manager to retrieve the value of an object defined in an agent.
2. A manager to store a value in an object defined in an agent.
3. An agent to send an alarm message about an abnormal situation
(such as it’s rebooting) to the manager.
PDUs
SNMPv3 defines eight types of packets (or PDUs): GetRequest,
GetNextRequest, GetBulkRequest, SetRequest, Response,
Trap, InformRequest and Report.
GetRequest: it is sent from the manager (client) to the agent
(server) to retrieve the value of a variable or a set of variables.
GetNextRequest: it is sent from the manager (client) to the agent
(server) to retrieve the value of a variable. It is mostly used to
retrieve the values of the entries in a table.
GetBulkRequest: it is sent from the manager (client) to the agent
(server) to retrieve a large amount of data. It can be used
instead of above two PDUs
SNMP (Simple Network Management Protocol)
PDUs
SetRequest: it is sent from the manager (client) to the agent
(server) to set (store) a value in a variable.
Response: it is sent from an agent (server) to the manager
(client) in response to GetRequest or GetNextRequest. It
contains the values of the variables requested by manager.
Trap: the trap PDU is sent from the agent (server) to the
manager (client) to report an event, for example: if the agent
is rebooted, it informs the manager and reports the time of
rebooting.
InformRequest: it is sent from one manager (client) to another
remote manager to get the value of some variables from
agents under the control of the remote manager. The remote
manager responds with a Response PDU.
Report: the Report PDU is designed to report some types of
errors between managers. It is not yet in use.
SNMP
Manager
Client
SNMP
Agent
Server
GetRequest
GetNextRequest
GetBulkRequest
SetRequest
Response
Trap
InformRequest
Report
To another manager
To another manager
UDP Connection
SNMP: PDUs
SNMP: PDUs Format
The format of the eight SNMP PDUs shown in figure. The
GetBulkRequest PDU differs from the others in two areas.
1) Error status and error index values are zeros for all
request messages except GetBulkRequest.
2) Error status field is replaced by nonrepeater field and
error index field is replaced by max-repetitions field in
GetBulkRequest.
PDU
type
Request
ID
Error
status
Error
index
Variable Value Variable Value
VarBind list
PDU
SNMP: PDUs Format
PDU type: it defines the type of PDU.
Request ID: it is a sequence number used by the manager in a
Request PDU and repeated by the agent in a response. It is
used to match a request to a response.
Error status: it is a integer used only in Response PDUs to
show the types of errors reported by the agent. It’s value is 0
in a Request PDUs.
Nonrepeaters: it is used only in GetBulkRequest and replaces
the error status field, which is empty in Request PDUs.
Error index: it is an offset that tells the manager which variable
caused the error.
Max-repetition: it is used only in GetBulkRequest and replaces
the error index field, which is empty in Request PDUs.
VarBind list: it is a set of variables with corresponding values the
manager wants to retrieve or set. The values are null in
GetRequest and GetNextRequest.
SNMP: Messages
SNMP does not send only a PDU,
it sends the PDU in message.
In SNMPv3 a message consist of
four elements: version, header,
security parameters and data.
Version: defines the current
version 3.
Header: contains value for
message identification,
maximum message size etc.
Security parameter: is used to
create a message digest.
Data: the data contains the PDU
data.
PDU
Request ID
Error status
Error index
VarBind list
.
.
Object Identifier
Value to be stored
Data
Context engine ID
Context name
Security parameter
Version
Header
Message
SNMP: Codes for SNMP Messages
Data Class Format Number Whole Tag
(Binary)
Whole Tag
(Hex)
GetRequest 10 1 00000 10100000 A0
GetNextRequest 10 1 00001 10100001 A1
Response 10 1 00010 10100010 A2
SetRequest 10 1 00011 10100011 A3
GetBulkRequest 10 1 00101 10100101 A5
InformRequest 10 1 00110 10100110 A6
Trap(SNMPv2) 10 1 00111 10100111 A7
Report 10 1 01000 10101000 A8
SNMP
Types of Errors:
Status Name Meaning
0 noError No error
1 tooBig Response too big to fit in one
message
2 noSuchName Variables does not exist
3 badValue The value to be stored is invalid
4 readOnly The value can not be modified
5 genErr Other errors
UDP Ports:
SNMP uses the services of UDP on two well-known ports, 161 and
162.
- the well known port 161 is used by the server (agent).
- the well known port 162 is used by the client (manager).
SNMP: Security
The main difference between SNMPv3 and
SNMPv2 is the enhanced security.
- SNMPv3 provides two types of security:
general (SNMPv2) and specific (Security
parameter added in the header).
-SNMPv3 provides message authentication,
privacy and manager authentication.
- In addition to this SNMPv3 allows a manager
to remotely change the security configuration.
SNMP: Specific Problems
• Work on SNMP security took many many years to finally
result in a stable and accepted SNMPv3 specification.
• Other urgently needed improvements were kept on hold
during this time.
• One such problem is the inefficiency of SNMP for retrieving
bulk MIB data.
- SNMP shows poor performance when retrieving several
thousands of MIB variables in a single logical transaction.
Reasons:
– Lack of flow control
– Bandwidth inefficiency due to OID naming overhead
– High latency caused by a large number of
request/response interactions.
• Extensions to the SMI data definition language needed to
simplify, generalize and harmonize data definitions.
Thank
YOU

More Related Content

What's hot

Simple Network Management Protocole
Simple Network Management ProtocoleSimple Network Management Protocole
Simple Network Management Protocole
Amin Komeili
 
SNMP
SNMPSNMP
Snmp
SnmpSnmp
Micaz and TelosB
Micaz and TelosBMicaz and TelosB
Micaz and TelosB
deepakraj348
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Online
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
FabMinds
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
Mohammed Farrah
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Combined PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Subhajit Sahu
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
FabMinds
 
SNMP
SNMPSNMP
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
Ramesh Babu
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Subnetting
SubnettingSubnetting
Subnetting
Kishore Kumar
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
rajisri2
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
xyxz
 

What's hot (20)

Simple Network Management Protocole
Simple Network Management ProtocoleSimple Network Management Protocole
Simple Network Management Protocole
 
SNMP
SNMPSNMP
SNMP
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Snmp
SnmpSnmp
Snmp
 
Micaz and TelosB
Micaz and TelosBMicaz and TelosB
Micaz and TelosB
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Combined PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
SNMP
SNMPSNMP
SNMP
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
IP Address
IP AddressIP Address
IP Address
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Subnetting
SubnettingSubnetting
Subnetting
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 

Similar to Simple Network Management Protocol by vikas jagtap

Network Management
Network ManagementNetwork Management
Network Management
Vivek Garg
 
Lesson 2 Understanding Types And Usage In Dot Net
Lesson 2    Understanding Types And Usage In Dot NetLesson 2    Understanding Types And Usage In Dot Net
Lesson 2 Understanding Types And Usage In Dot Net
nbaveja
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
Shantanu Hinge
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
Hamdamboy (함담보이)
 
Network management
Network managementNetwork management
Network managementsangusajjan
 
Chapter 2.datatypes and operators
Chapter 2.datatypes and operatorsChapter 2.datatypes and operators
Chapter 2.datatypes and operators
Jasleen Kaur (Chandigarh University)
 
CS4443 - Modern Programming Language - I Lecture (2)
CS4443 - Modern Programming Language - I  Lecture (2)CS4443 - Modern Programming Language - I  Lecture (2)
CS4443 - Modern Programming Language - I Lecture (2)
Dilawar Khan
 
Sqlmaterial 120414024230-phpapp01
Sqlmaterial 120414024230-phpapp01Sqlmaterial 120414024230-phpapp01
Sqlmaterial 120414024230-phpapp01
Lalit009kumar
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
Dr.Florence Dayana
 
1. Data structures introduction
1. Data structures introduction1. Data structures introduction
1. Data structures introduction
Mandeep Singh
 
Computer System Architecture
Computer System ArchitectureComputer System Architecture
Computer System Architecture
National Institute of technology Raipur
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmp
jorlugon
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
assinha
 
II B.Sc IT DATA STRUCTURES.pptx
II B.Sc IT DATA STRUCTURES.pptxII B.Sc IT DATA STRUCTURES.pptx
II B.Sc IT DATA STRUCTURES.pptx
sabithabanu83
 
Snmp
SnmpSnmp
Snmp
singh7599
 
[Distributed System] ch4. interprocess communication
[Distributed System] ch4. interprocess communication[Distributed System] ch4. interprocess communication
[Distributed System] ch4. interprocess communication
Gyuhyeon Nam
 
Data structure Unit-I Part A
Data structure Unit-I Part AData structure Unit-I Part A
Data structure Unit-I Part A
SSN College of Engineering, Kalavakkam
 
01. introduction to data structures
01. introduction to data structures01. introduction to data structures
01. introduction to data structures
ረዳኢ በሪሁ
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocols
shahin raj
 
unit5NtwManagement.ppt
unit5NtwManagement.pptunit5NtwManagement.ppt
unit5NtwManagement.ppt
RevathiMohan14
 

Similar to Simple Network Management Protocol by vikas jagtap (20)

Network Management
Network ManagementNetwork Management
Network Management
 
Lesson 2 Understanding Types And Usage In Dot Net
Lesson 2    Understanding Types And Usage In Dot NetLesson 2    Understanding Types And Usage In Dot Net
Lesson 2 Understanding Types And Usage In Dot Net
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
 
Network management
Network managementNetwork management
Network management
 
Chapter 2.datatypes and operators
Chapter 2.datatypes and operatorsChapter 2.datatypes and operators
Chapter 2.datatypes and operators
 
CS4443 - Modern Programming Language - I Lecture (2)
CS4443 - Modern Programming Language - I  Lecture (2)CS4443 - Modern Programming Language - I  Lecture (2)
CS4443 - Modern Programming Language - I Lecture (2)
 
Sqlmaterial 120414024230-phpapp01
Sqlmaterial 120414024230-phpapp01Sqlmaterial 120414024230-phpapp01
Sqlmaterial 120414024230-phpapp01
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
 
1. Data structures introduction
1. Data structures introduction1. Data structures introduction
1. Data structures introduction
 
Computer System Architecture
Computer System ArchitectureComputer System Architecture
Computer System Architecture
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmp
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
II B.Sc IT DATA STRUCTURES.pptx
II B.Sc IT DATA STRUCTURES.pptxII B.Sc IT DATA STRUCTURES.pptx
II B.Sc IT DATA STRUCTURES.pptx
 
Snmp
SnmpSnmp
Snmp
 
[Distributed System] ch4. interprocess communication
[Distributed System] ch4. interprocess communication[Distributed System] ch4. interprocess communication
[Distributed System] ch4. interprocess communication
 
Data structure Unit-I Part A
Data structure Unit-I Part AData structure Unit-I Part A
Data structure Unit-I Part A
 
01. introduction to data structures
01. introduction to data structures01. introduction to data structures
01. introduction to data structures
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocols
 
unit5NtwManagement.ppt
unit5NtwManagement.pptunit5NtwManagement.ppt
unit5NtwManagement.ppt
 

More from Vikas Jagtap

ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
Vikas Jagtap
 
broad band networks
 broad band networks broad band networks
broad band networks
Vikas Jagtap
 
KNOWLEDGE BASE SYSTEMS
KNOWLEDGE  BASE SYSTEMSKNOWLEDGE  BASE SYSTEMS
KNOWLEDGE BASE SYSTEMS
Vikas Jagtap
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
Vikas Jagtap
 
Overview of Object-Oriented Concepts Characteristics by vikas jagtap
Overview of Object-Oriented Concepts Characteristics by vikas jagtapOverview of Object-Oriented Concepts Characteristics by vikas jagtap
Overview of Object-Oriented Concepts Characteristics by vikas jagtap
Vikas Jagtap
 
things which make think ooh!!!!!!!! by vikas jagtap
things which make think ooh!!!!!!!! by vikas jagtapthings which make think ooh!!!!!!!! by vikas jagtap
things which make think ooh!!!!!!!! by vikas jagtap
Vikas Jagtap
 
Paradise on earth
Paradise on earthParadise on earth
Paradise on earth
Vikas Jagtap
 
Dear son daughter by vikas jagtap
Dear son daughter   by vikas jagtapDear son daughter   by vikas jagtap
Dear son daughter by vikas jagtap
Vikas Jagtap
 
Double vision by vikas jagtap
Double vision by vikas jagtapDouble vision by vikas jagtap
Double vision by vikas jagtap
Vikas Jagtap
 
Dubai by vikas jagtap
Dubai by vikas jagtapDubai by vikas jagtap
Dubai by vikas jagtap
Vikas Jagtap
 
District of maharashtra by vikas jagtap
District of maharashtra by vikas jagtapDistrict of maharashtra by vikas jagtap
District of maharashtra by vikas jagtap
Vikas Jagtap
 
Cr java concept by vikas jagtap
Cr java  concept by vikas jagtapCr java  concept by vikas jagtap
Cr java concept by vikas jagtap
Vikas Jagtap
 
Jdbc ppt
Jdbc pptJdbc ppt
Jdbc ppt
Vikas Jagtap
 
Jsp ppt
Jsp pptJsp ppt
Jsp ppt
Vikas Jagtap
 
Servlet ppt by vikas jagtap
Servlet ppt by vikas jagtapServlet ppt by vikas jagtap
Servlet ppt by vikas jagtap
Vikas Jagtap
 
Animation technique
Animation techniqueAnimation technique
Animation techniqueVikas Jagtap
 
Amit
AmitAmit
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
Vikas Jagtap
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
domain network services (dns)
 domain network services (dns) domain network services (dns)
domain network services (dns)
Vikas Jagtap
 

More from Vikas Jagtap (20)

ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
broad band networks
 broad band networks broad band networks
broad band networks
 
KNOWLEDGE BASE SYSTEMS
KNOWLEDGE  BASE SYSTEMSKNOWLEDGE  BASE SYSTEMS
KNOWLEDGE BASE SYSTEMS
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
 
Overview of Object-Oriented Concepts Characteristics by vikas jagtap
Overview of Object-Oriented Concepts Characteristics by vikas jagtapOverview of Object-Oriented Concepts Characteristics by vikas jagtap
Overview of Object-Oriented Concepts Characteristics by vikas jagtap
 
things which make think ooh!!!!!!!! by vikas jagtap
things which make think ooh!!!!!!!! by vikas jagtapthings which make think ooh!!!!!!!! by vikas jagtap
things which make think ooh!!!!!!!! by vikas jagtap
 
Paradise on earth
Paradise on earthParadise on earth
Paradise on earth
 
Dear son daughter by vikas jagtap
Dear son daughter   by vikas jagtapDear son daughter   by vikas jagtap
Dear son daughter by vikas jagtap
 
Double vision by vikas jagtap
Double vision by vikas jagtapDouble vision by vikas jagtap
Double vision by vikas jagtap
 
Dubai by vikas jagtap
Dubai by vikas jagtapDubai by vikas jagtap
Dubai by vikas jagtap
 
District of maharashtra by vikas jagtap
District of maharashtra by vikas jagtapDistrict of maharashtra by vikas jagtap
District of maharashtra by vikas jagtap
 
Cr java concept by vikas jagtap
Cr java  concept by vikas jagtapCr java  concept by vikas jagtap
Cr java concept by vikas jagtap
 
Jdbc ppt
Jdbc pptJdbc ppt
Jdbc ppt
 
Jsp ppt
Jsp pptJsp ppt
Jsp ppt
 
Servlet ppt by vikas jagtap
Servlet ppt by vikas jagtapServlet ppt by vikas jagtap
Servlet ppt by vikas jagtap
 
Animation technique
Animation techniqueAnimation technique
Animation technique
 
Amit
AmitAmit
Amit
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Network security
 Network security Network security
Network security
 
domain network services (dns)
 domain network services (dns) domain network services (dns)
domain network services (dns)
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Simple Network Management Protocol by vikas jagtap

  • 1.
  • 2. NETWORK MANAGEMENT • NETWORK MANAGEMENT can be defined as monitoring, testing, configuring and trouble shooting network components to meet a set of requirements defined by an organization. • Set of requirements include the smooth, efficient operation of the network that provides the predefined quality of service for users. • Functions of Network Management System - Configuration management - Fault management - Performance management - Security management - Accounting management
  • 3. SNMP- Simple Network Management Protocol • The SNMP is a framework for managing devices in an internet using the TCP/IP protocol suite. • It provides a set of fundamental operations for monitoring and maintaining an internet devices. • Concept: SNMP uses the concept of manager and agent.
  • 4. SNMP- Managers and Agents • A management station, called a manager, is a host computer that runs the SNMP client program. • A managed station, called as an agent, is a router (or a host) that runs the SNMP server program. • Management is achieved through simple interaction between a manager and an agent. • Management with SNMP is based on 3 basic idea. 1) A manager checks an agent by requesting information in the form of variables that reflects the behavior of the agent. 2) A manager forces an agent to perform a task by resetting values of variables in the agent database. 3) An agent contributes to the management process by warning the manager of an unusual situation (reboot).
  • 5. MANAGEMENT Components • To do the management task, SNMP uses two other protocols: Structure of Management Information (SMI) and Management Information Base (MIB). • Means, Management on the Internet is done through the cooperation of the three protocols SNMP, SMI and MIB.
  • 6. MANAGEMENT Components Role of SNMP • It defines the format of the packet to be sent from a manager to an agent and vice versa. • It also interprets the result and creates statistics. • The packets exchanged contain the object (variable) names and their status (values). • SNMP is responsible for reading and changing these values. Role of SMI • It defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. • SMI does not define the number of objects an entity should manage or name the objects to be managed or define the association between the objects and their values.
  • 7. MANAGEMENT Components Role of MIB • For each entity to be managed, this protocol must define the number of objects, name them according to the rules defined by SMI, and associate a type to each named object. • MIB creates a set of objects defined for each entity similar to a database. An Analogy • We can compare the task of network management to the task of writing a program. - both tasks need rules, in network management this is handled by SMI. - both tasks need variable declaration, in network management this is handled by MIB. - both tasks have actions performed by statements, in network management this is handled by SNMP.
  • 8. MANAGEMENT Components Structure of Management Information (SMI) • The SMI, version 2 (SMIv2) is a component for network management. Performs the functions such as - To name objects. - To define the type of data that can be stored in an object. - To show how to encode data for transmission over the network. • SMI is guideline for SNMP, it emphasizes three attributes to handle an object: name, data type and encoding method.
  • 9. Structure of SMI Name • The SMI, requires that each managed object (such as a router, a variable in a router, a value) have a unique name. • To name objects globally, SMI uses an “Object Identifier”, which is a hierarchical identifier based on tree structure. • Tree structure starts with an unnamed root, each object can be defined by using a sequence of integers separated by dots (used by SNMP). • Tree structure can also define an object by using a sequence of textual names separated by dots (used by people). - for example: iso.org.dod.internet.mgmt.mib 1.3.6.1.2.1 The objects that are used in SNMP are located under mib object, so their identifiers always starts with 1.3.6.1.2.1
  • 11. Structure of SMI Type of data • The second attribute of an object is the type of data stored in it. • To define the data type, SMI uses fundamental Abstract Syntax Notation 1 (ASN.1) definitions and adds some new definitions i.e. SMI is both a subset and superset of ASN.1. • It has 2 categories of data types: simple and structured.
  • 12. Structure of SMI Type of data • Simple data type: the first five are from ASN.1; next seven are defined by SMI. Type Size Description INTEGER 4 bytes An integer with a value between -231 and 231 -1 Integer32 4 bytes Same as INTEGER Unsigned32 4 bytes Unsigned with value between 0 and 232 -1 OCTECT STRING Variable Byte string up to 65,535 bytes long OBJECT IDENTIFIER Variable An Object Identifier IPAddress 4 bytes An IP Address made of 4 integers Counter32 4 bytes An Integer whose value can be incremented from 0 to 232 ; when it reaches its maximum value, it wraps back to 0 Counter64 8 bytes 64-bit counter Gauge32 4 bytes Same as Counter32, but when it reaches its maximum value, it does not wrap; it remains there until it is reset. TimeTicks 4 bytes A counting value that records time in 1/100 second BITS A string of bits Opaque Variable Un interpreted string
  • 13. Structure of SMI Type of data • Structured data type: SMI defines two structured data types- Sequence and Sequence of. • Sequence: it is a combination of simple data types, not necessarily same type. It is like the concept of struct in C. • Sequence of: it is a combination of simple data types all of same type. It is like the concept of array in C.
  • 14. Structure of SMI Data Encoding Method • SMI uses standard, Basic Encoding Rules (BER), to encode data to be transmitted over the network. • BER specifies each piece of data be encoded in triplet format: tag, length and value. • Tag: it is a 1 byte field that defines the type of data. It consist of 3 subfields: class (2bits), format (1bit) and number (5bits). - Class field defines the scope of the data: four classes are defined: Universal (00), application wide (01), context specific (10) and private (11).
  • 15. Structure of SMI Data Encoding Method • The Universal (00) data types are taken from ASN.1 (INTEGER, OCTECT STRING, and ObectIdentifier). • The Application wide (01) are added by SMI (IPAddress, Counter, Gauge and TimeTicks). • The 5 context-specific (10) data types have meanings that may change from one protocol to another. • The private (11) data types are vendor specific. • The format subfield indicates whether the data are simple (0) or structured (1). • The number subfield further divides simple or structured data into subgroups for example: in the universal class, with simple format, INTEGER has a value of 2, OCTECT STRING has a value of 4 and so on.
  • 16. Structure of SMI Data Encoding Method • Length: it is 1 or more bytes. If it is 1 byte, the MSB is 0, the other 7 bits defines the length of data. If it is more than 1 byte, the MSB of the first byte must be 1 and other 7 bits defines the number of bytes needed to define the length. • Value: it codes the value of the data according to the rules defined in BER 0
  • 17. Structure of SMI Data Encoding Method • Following table shows the data types and their tags in binary and Hexadecimal numbers. Data Type Class Format Number Tag (Binary) Tag (Hex) INTEGER 00 0 00010 00000010 02 OCTECT STRING 00 0 00100 00000100 04 OBJECT IDENTIFIER 00 0 00110 00000110 06 NULL 00 0 00101 00000101 05 Sequence, Sequence of 00 1 10000 00110000 30 IPAddress 01 0 00000 01000000 40 Counter 01 0 00001 01000001 41 Gauge 01 0 00010 01000010 42 TimeTicks 01 0 00011 01000011 43 Opaque 01 0 00100 01000100 44
  • 18. Structure of SMI Data Encoding Method • Just to show how these three fields: tag, length and value are used to define objects, for example: how to define INTEGER 14. • Another example: how to define OCTECT STRING “HI”.
  • 19. MIB (Management Information Base) MIB Version 2 (MIB2) is a second component used in network management. • Each agent has its own MIB2, which is a collection of all objects that the manager can manage. • The objects in MIB2 are categorized under 10 different groups: system, interface, address translation, ip, icmp, tcp, udp, egp, transmission and snmp. • These groups are under MIB2 object in the object identifier tree. Each group has defined variables and/ or tables.
  • 20. MIB (Management Information Base) Following is a brief description of some of the objects. • sys: system object defines general information about the node (system) such as name, location, and lifetime. • if: interface object defines information about all the interfaces of the node including interface no. physical address and IP address. • at: address translation object defines information about the ARP table. • ip: this object defines information related to IP (routing table, IP address). • icmp: this object defines information about the ICMP (no. of packets sent and received and total errors created). • tcp: this object defines information about the TCP (connection table, time-out value, no. of ports and no. of packets sent and received ). • udp: this object defines information about the UDP ( no. of ports and no. of packets sent and received ). • Snmp: this object defines information about SNMP (itself).
  • 21. MIB (Management Information Base) Accessing MIB variables. • Simple variables: to access the simple variables, we use the id of the group followed by the id of the variable. Following figure shows how to access each variable. For example: we use the group udp, then variables under udp group can be accessed as follows. udpInDatagrams 1.3.6.1.2.1.7.1 udpNoPorts 1.3.6.1.2.1.7.2 udpInErrors 1.3.6.1.2.1.7.3
  • 22. SNMP (Simple Network Management Protocol) SNMP uses both SMI and MIB in Internet network management. It is an application program that allows 1. A manager to retrieve the value of an object defined in an agent. 2. A manager to store a value in an object defined in an agent. 3. An agent to send an alarm message about an abnormal situation (such as it’s rebooting) to the manager. PDUs SNMPv3 defines eight types of packets (or PDUs): GetRequest, GetNextRequest, GetBulkRequest, SetRequest, Response, Trap, InformRequest and Report. GetRequest: it is sent from the manager (client) to the agent (server) to retrieve the value of a variable or a set of variables. GetNextRequest: it is sent from the manager (client) to the agent (server) to retrieve the value of a variable. It is mostly used to retrieve the values of the entries in a table. GetBulkRequest: it is sent from the manager (client) to the agent (server) to retrieve a large amount of data. It can be used instead of above two PDUs
  • 23. SNMP (Simple Network Management Protocol) PDUs SetRequest: it is sent from the manager (client) to the agent (server) to set (store) a value in a variable. Response: it is sent from an agent (server) to the manager (client) in response to GetRequest or GetNextRequest. It contains the values of the variables requested by manager. Trap: the trap PDU is sent from the agent (server) to the manager (client) to report an event, for example: if the agent is rebooted, it informs the manager and reports the time of rebooting. InformRequest: it is sent from one manager (client) to another remote manager to get the value of some variables from agents under the control of the remote manager. The remote manager responds with a Response PDU. Report: the Report PDU is designed to report some types of errors between managers. It is not yet in use.
  • 25. SNMP: PDUs Format The format of the eight SNMP PDUs shown in figure. The GetBulkRequest PDU differs from the others in two areas. 1) Error status and error index values are zeros for all request messages except GetBulkRequest. 2) Error status field is replaced by nonrepeater field and error index field is replaced by max-repetitions field in GetBulkRequest. PDU type Request ID Error status Error index Variable Value Variable Value VarBind list PDU
  • 26. SNMP: PDUs Format PDU type: it defines the type of PDU. Request ID: it is a sequence number used by the manager in a Request PDU and repeated by the agent in a response. It is used to match a request to a response. Error status: it is a integer used only in Response PDUs to show the types of errors reported by the agent. It’s value is 0 in a Request PDUs. Nonrepeaters: it is used only in GetBulkRequest and replaces the error status field, which is empty in Request PDUs. Error index: it is an offset that tells the manager which variable caused the error. Max-repetition: it is used only in GetBulkRequest and replaces the error index field, which is empty in Request PDUs. VarBind list: it is a set of variables with corresponding values the manager wants to retrieve or set. The values are null in GetRequest and GetNextRequest.
  • 27. SNMP: Messages SNMP does not send only a PDU, it sends the PDU in message. In SNMPv3 a message consist of four elements: version, header, security parameters and data. Version: defines the current version 3. Header: contains value for message identification, maximum message size etc. Security parameter: is used to create a message digest. Data: the data contains the PDU data. PDU Request ID Error status Error index VarBind list . . Object Identifier Value to be stored Data Context engine ID Context name Security parameter Version Header Message
  • 28. SNMP: Codes for SNMP Messages Data Class Format Number Whole Tag (Binary) Whole Tag (Hex) GetRequest 10 1 00000 10100000 A0 GetNextRequest 10 1 00001 10100001 A1 Response 10 1 00010 10100010 A2 SetRequest 10 1 00011 10100011 A3 GetBulkRequest 10 1 00101 10100101 A5 InformRequest 10 1 00110 10100110 A6 Trap(SNMPv2) 10 1 00111 10100111 A7 Report 10 1 01000 10101000 A8
  • 29. SNMP Types of Errors: Status Name Meaning 0 noError No error 1 tooBig Response too big to fit in one message 2 noSuchName Variables does not exist 3 badValue The value to be stored is invalid 4 readOnly The value can not be modified 5 genErr Other errors UDP Ports: SNMP uses the services of UDP on two well-known ports, 161 and 162. - the well known port 161 is used by the server (agent). - the well known port 162 is used by the client (manager).
  • 30. SNMP: Security The main difference between SNMPv3 and SNMPv2 is the enhanced security. - SNMPv3 provides two types of security: general (SNMPv2) and specific (Security parameter added in the header). -SNMPv3 provides message authentication, privacy and manager authentication. - In addition to this SNMPv3 allows a manager to remotely change the security configuration.
  • 31. SNMP: Specific Problems • Work on SNMP security took many many years to finally result in a stable and accepted SNMPv3 specification. • Other urgently needed improvements were kept on hold during this time. • One such problem is the inefficiency of SNMP for retrieving bulk MIB data. - SNMP shows poor performance when retrieving several thousands of MIB variables in a single logical transaction. Reasons: – Lack of flow control – Bandwidth inefficiency due to OID naming overhead – High latency caused by a large number of request/response interactions. • Extensions to the SMI data definition language needed to simplify, generalize and harmonize data definitions.