Relational Network Manager for IP Networks

Size: px
Start display at page:

Download "Relational Network Manager for IP Networks"

Transcription

1 Relational Network Manager for IP Networks Yuri Breitbart, Deepakraj Shanthilal Department of Computer Science Kent State University Kent, OH Abstract This paper deals with an issue of effective network management for an enterprise IP network. It focuses on SNMP based protocols that are widely used in current network management. The major problem with the SNMP based network management is that it does not provide network managers with a unified picture of the network when the network manager may query the network from several SNMP tables with a single request. Furthermore, SNMP does not provide network manager with historical network information. In this paper we propose a new network management tool that is also based on SNMP but uses a relational database approach to the storing and accessing the SNMP data. Our tool uses SQL query language to access network information and allows network manager to keep network historical information. The major advantage of our tool is in guaranteeing scalability and network data management data consistency. Key Words: Network Management, SNMP, MIB, Relational Database, IP Network I. INTRODUCTION In this paper we deal with an important issue of effective network management for an enterprise IP network. The effectiveness of network management critically depends upon the availability of network information collected from different network nodes. A timely collection of such information is a difficult and important task. Most current network management systems use a Simple Network Management Protocol (SNMP) [7], [5] designed in the late 80 s. The SNMP based network management architecture shown in Figure 1 includes entities of two types: SN M P M anager and SNMP Agent. An SNMP manager is normally located at a single network node - network management site (NMS) - and collects information from SNMP agents located at network nodes. In addition, an SNMP agent may send notifications about the node status to the SNMP manager independently of the SNMP manager s requests. An SNMP agent extracts the network management information from Management Information Base [8] (MIB) variables that are stored at the node where the agent is located. An MIB has a hierarchical structure in which each MIB table is placed at the MIB leaf node. An SNMP based network management has a number of important advantages. Among them are: 1. SNMP is a standard protocol and, consequently, it is easier to ensure the interoperability of network element management systems each of which manages a separate network node. 2. The SNMP protocol allows the settings of traps in network nodes to notify an SNMP manager about events of interest to the manager. 3. Applications that use the SNMP protocol do not require making any changes in the network element management software. There are, however, several problems with SNMP based network management. 1. Due to the hierarchical structure of an MIB, the SNMP protocol does not provide any tools to query several MIB tables with a single command or, alternatively, to select only specific columns from a given MIB table. Consider, for example, requesting information on a system name of all next hop routers for a given IP address. This requires

2 Fig. 1. Conceptual View of the SNMP Based Network Management submitting an snmpwalk command to select all next hop IP addresses, and then for every next hop IP address another snmpwalk command must be submitted to extract the next hop system name. Similarly, requesting MAC addreses of each router port along with a port description currently results in the selection of a complete ift able after which a selection predicate is applied to the retrieved result in order to obtain the requested information. This process is cumbersome, time consuming, inefficient, and generates a significant load at the network elements that execute SNMP commands. 2. There are no tools to preserve consistency of retrieved MIB information. The difficulty is that querying MIB tables with different SNMP commands cannot assure the synchronization of information from these tables. Consider, for example querying ipnettomedia and iproutingtable tables by submitting two snmpwalk commands: one for querying an ipnettomedia table and another for querying iproutingtable table. Since both tables are located in the network node memory (as shown in Figure 1), some information from an ipnetto- Media table could have been cached out at the time when application queries the iproutingtable table. 3. The SNMP protocol cannot access any historical information about the network. This is due to the fact that MIB is located in the memory and the MIB information that is cached out of MIB is no longer accessible. 4. The SNMP protocol was mainly designed for managing the network at the network element layer as opposed to the network layer. Consequently, managing the network at the network layer using the SNMP protocol presents a difficult challenge. 5. Finally, scalability (or a lack thereof) is a well known problem of the SNMP protocol. While the overhead that SNMP imposes on network traffic is minimal, the time the network element spends on servicing SNMP commands is unacceptable high and, as a result, many network managers restrict SNMP access to their nodes. This situation clearly mandates the development of an effective, general-purpose network management tool that guarantees the synchronous access to MIB information in the network. This tool should be based on the industry standard SNMP protocol but should address the drawbacks described above. In this paper we describe one such tool. Our tool uses a fully functional SQL language to access network management information either at the network node or at the backend relational database that contains the most recent MIB information as well as historical MIB information. Figure 2 depicts the conceptual architecture of network management based on our approch. The database is located at the network management site. The MIB hierarchical structure is converted into a relational database structure. Network Monitor periodically updates the database by monitoring network elements in the background, MIB changes since the last update. Alternatively, using SNMP traps, a network node sends updated information to the monitor which, in turn, updates the backend database. Consequently, the issue of scalability

3 on a backend machine only. In a rare case, when the latest MIB information has not yet been propagated to the database, the database loader module extracts the latest data from the MIB and these data are propagated to the database. The issue of network management at the network layer becomes much easier to resolve since the network manager can access several network nodes and display their status with a single query or a query script. Fig. 2. Conceptual View of the SNMP Based Relational Network Manager does not arise since most of the managers queries can be answered using the database information without going to the MIBs. This relieves a network node from processing network management requests and further reduces the network management traffic. Network manager requests are formulated in the SQL language and as such the queries may include many join operations as well as aggregate functions. Thus, the issue of selective access to the MIB information is resolved. Using a full fledged database management system resolves the issue of data consistency for data retrieved by the network manager. The issue of synchronous database access is resolved by accessing the database directly The idea of converting the hierarchical structure of MIB into a relational database has been discussed in several papers [1], [3], [4]. In [1] the authors discuss a conversion of MIB into a SQL database where each MIB table is converted into a relational table. However, the issue of how to relate tables from different MIBs is not addressed there, since their language does not admit several MIBs into one relational database, which is the approach we take in this paper. In [3] the authors mainly discuss the MIB software and do not directly address the issue of conversion of MIBs into a relational database. They review several software tools that are based on the SNMP protocol and discuss their advantages and disadvantages. In [4] the authors discuss an application of XML to describe MIBs. They argue that XML documents can serve as an excellent tool for exchanging data between different network nodes. However, the issue of integrating data from MIBs of different nodes is not addressed there. Recently, ORACLE released their network manager application [6] which is collecting data from different MIBs into a single relational database. However, their tool does not address scalability issues. That is, the main goal of their application is to keep historical data in the database. The issue of automatic data refresh is not addressed there. The remainder of this paper is organized as follows. Section II reviews necessary background information and presents the conceptual architecture of our system. Section III discusses implementation issues and the current state of the system. Finally, section IV, discusses remaining challenges and concludes the paper.

4 Fig. 3. Examples of Database Table generated from MIBs II. MODEL AND ARCHITECTURE Our model includes two major components: backend relational database and data collection/data refreshment architectures. We describe these components below. A. Database A backend database is a relational database consistng of several relations. The database includes a special inventory table that contains IP addresses of all network nodes along with their interconnections. To collect such information each node entering the network broadcasts its IP address to all other nodes including the NMS site. The Network Monitor, upon receiving a new IP address begins to monitor a newly integrated node. In addition, the system periodically runs a network discovery program that probes every possible IP number allocated to the network manager. In [2] we discuss in detail how to create and maintain the inventory table. The other relations in the database describe various MIB-2 tables (such as system, interfaces, ip, ipaddr, iproute, ipnettomedia, icmp, tcp tcpconn tables, and many others). For example, the ipaddrtable contains the following attributes: IPaddress, ipadentaddr, ipadentifindex, ipadent- NetMask, ipadentbcasraddr, and ipadentreasm- MaxSize. Some of other tables are illustrated in Figure 3. Fig. 4. Conceptual Architecture of Relational Network Manager A primary key of the inventory table is an IP address. The primary key of each MIB relation is the primary key of the MIB table concatenated with the IP address of the MIB. For example, the primary key of the ipaddrt able table of node a is an IP address of a and ipadentaddr of the specific interface of a. Each tuple in each relation includes a timestamp that indicates the time that the record was downloaded from the network MIBs. Each time that the Network Monitor sends the new data to the Database Loader, the Database Loader updates the timestamp of the records that have changed. B. Relational Network Manager Architecture The relational network manager architecture is depicted in Figure 4. The User Interface accepts user requests submitted either in the form of a SQL query or a query script. All query scripts are stored in the script library. Each script describes a specific function of a network manager. For example, there is a script that allows displaying a network status of a specific subnetwork, its utilization, and its fault rate. The User Interface forwards the user request to the Scheduler. The Scheduler role is to decide whether the request can be satisfied with the information from the database, or the database needs

5 to be refreshed with the MIB data from network nodes, or a combination of both. The Scheduler upon receiving the user request, verifies whether the database contains the data timestamped with the timestamp that is sufficiently close to the timestamp of the request. If the request timestamp is smaller than the timestamp of the requested data, the Scheduler verifies whether the requested data was updated after it was loaded to the database. If the data was updated, the Scheduler schedules a request for the updated data to be submitted directly to the network node s MIBs. Otherwise, the request is submitted to the relational database manager (ORACLE 9 ) for processing. The relational manager processes the request and displays the result on the network manager display. As previously stated, in some cases, the user request ask for some data directly from the node s MIB. While the data is periodically updated by the database loader, it may happen that the request occurred just between two periodic updates of the database. If the network manager request requires direct access to several MIB tables, then the request is forwarded to the SNMP Request Generator. The major role of the SNMP Request Generator is to translate the query into a set of SNMP commands, to submit these commands to the node s MIBs, to collect results of these commands, and pass them to the Scheduler. The Scheduler passes them to the Database Loader to insert the new data into the backend database. The SNMP Request Generator generates a set of snmpwalk, snmpget, and snmptable commands, submits them to the respective MIBs and monitors their execution. After receiving responses from the node s MIBs, the SNMP Request Generator sends them to the Scheduler, which, in turn, translates them into a set of update statements and sends them to the Database Loader for execution. At the same time the results of the user request are displayed at the network manager station. To illustrate, let us consider the following example. Suppose that the network manager for a given IP address, IP 1, wants to find a system contact for every node that is the next hop in the routing table of IP 1. Further, suppose that the inventory table contains the following IP addresses: IP 1, IP 2, IP 3 and IP 4. Let system table contain system information for IP 1 and IP 2. Suppose that IP routing table contain IP 2 and IP 3 as next hops for IP 1, and IP 1 and IP 3 as next hops for IP 2. To obtain the information the netwoork manager submits the following query: SELECT IP, syscontact FROM Inventory, System, iproutetable Where Inventory.IP = iproutetable.ip and System.IP = iproutetable.ipn exthop; The Scheduler receives the above query and forwards it to the relational database manager for execution. Prior to that, each of the indicated join operations is replaced with an outer join operation. The result of the query is the following table: IP Contact IP1 Jay IP2 John IP3 - Since the information on system contact for IP 3 is missing, the Scheduler requests that information from the SNMP Request Generator which generates the following SNMP command: SNMP W ALK -c public IP3 system This command is submitted to the node with the IP address equal to IP3. After receiving the information from MIB, the SNMP Request Generator sends the results to the Scheduler which, in turn, generates the following update statement: update system set syscontact = George where IPAddress = IP3; and sends it to the Database Loader which, in turn, executes the command by filling in the system contact for IP 3 in the table above. The Scheduler reviews whether any other information needs to be obtaind from the database and if the request is completed, passes it to the user interface which, in turn, displays the result for the network manager. As we mentioned earlier, the Network Monitor collects the changes in all network MIBs since the last

6 database update and propagates these changes into the database. Clearly, the majority of MIB s variables do not change very often. For example, the sysname attribute is stable for the lifetime of the network node. Consequently, not all MIB variables need to be monitored. We choose to monitor only MIB variables of the type Counter. Other variable types are monitored only if there are changes in the network. For example, suppose some connections in the network have changed. This, in turn, results in changes of variables describing the connection. Since such changes are done by the network manager, the Network Monitor is automatically run after any network manager initiated network change. MIB variables of type counter are monitored by setting SNMP traps. We observe that not all counters can be monitored with the SNMP traps, since otherwise, traps may impose a significant network overhead. Consequently, we require that the Network Monitor periodically updates all counter variables into the database. The periodicity of such updates is selected by the network manager that on the one hand, wants to monitor these variables as closely as possible and on the other hand, does not want to generate a significant network overhead by downloading these variables. III. IMPLEMENTATION We have partially implemented the Relational Network Manager (RNM). In this section we describe the current state of implementation. The system is implemented under the RedHat Linux system using the ORACLE 9 relational database manager. We also used a publicly available SNMP protocol package. The system was tested in our lab that included 3 Cisco 7500 routers, 4 Avaya Cajun switches and numerous workstations and desktops interconnected into an autonomous network with access to the departmental network as well as university networks. The current version of our system does not include the Network Monitor that is is being implemented. We extensively experimented with the system. Clearly,the system even without the Network Monitor sigificantly reduces the network overhead at the network nodes. The main reason is that the majority of the network requests are answered from the database using ORACLE and the ORACLE s query optimization capabilities. The network changes are infrequent, thereby reducing the need for an extensive network monitoring. The situation changes dramatically, if the network goes through network faults that causes rapid changes in the network active paths. In such cases, the queries require the access to MIBs. We observe (using simulation approach) that the frequency of going to the MIBs critically depends on two parameters: frequency of the database updates and the the frequency of network faults. Database updates are caused either by the user after the new information is received from a MIB or by the network monitoring that sends a new update statement to the database. Network faults create much more serious problem. The reason is that a fault of some links can generate a cascading effect on the network, leading to massive changes to network node MIBs and as a consequence, these changes trigger changes to the database. During this process the database may contain inconsistent database. We are developing concurrency control algorithms that exclude user from getting the lates data. The user is informed that the earlier version of the data is available. The user then decides whether to use the earlier data version and possible to see an inconsistent network view, or to cancel the request. The research on these issues still continues. IV. CONCLUSIONS In this paper we describe the network management system which is based on two main ideas: 1. Current and historical MIB data for all network nodes are kept and periodically updated in the backend relational database system. 2. Network manager s requests are primarily handled by relational database manager (ORACLE 9 in our case). Consequently, the network management requests are optimized by query optimizer of ORACLE and directed to the backend database. This allows to

7 eliminate the network node overhead which is currently generated by handling MIB queries. In rare cases, when the request is directed to one or more MIBs, our system optimizes the number of SNMP commands requesting the information. There are still several issues that we continue to work on. Among them are: 1. Frequency of database updates with the fresh MIB data. 2. Semantic merge of MIB information from different network nodes. We have implemented a prototype of the network management system based on these ideas. Extensive experimentation with our prototype confirms clear advantage of our approach over a traditional SNMP based network management system. REFERENCES [1] Wengyik Yeong SNMP Query Language, Technical Report: , Performance Systems International, Inc., 1990 [2] Breitbart, Garofalakis, Rastogi, Seshadri, Silberschatz Topology Discovery in Heterogeneous IP Networks Proceedings of the INFOCOM 2000 Conference, [3] J. Schoenwaelder Evolution of Open Source SNMP Tools Proceedings of SANE 2002 Conference, May, [4] Jeong-Hyuk Yoon, Hong-Taek Ju and James W. Hong Development of SNMP-XML-based integrated network management International Journal of Network Management, 13: , 2003 [5] J. Case, M. Fedor, M. Schoffstall, and J. Davin, A Simple Network Management Protocol (SNMP), Internet RFC-1157 (available from May [6] Oracle SNMP Support, White paper (available from partners /snmp wp.html/. [7] William Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, Addison-Wesley Longman, Inc., 1999, (Third Edition). [8] K. McCloghrie and M. Rose, Management Information Base for Network Management of TCP/IP-based internets: MIB-II, Internet RFC-1213 (available from Mar

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2017-05-22 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Lecture 11: Introduction to Network Management

Lecture 11: Introduction to Network Management Lecture 11: Introduction to Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 11-1 Objective Manage a network by managing its components: routers,

More information

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2014-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Lecture 18: Network Management

Lecture 18: Network Management Lecture 18: Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 18-1 Objective Manage a network by managing its components: routers, bridges,

More information

SNMP SIMULATOR. Description

SNMP SIMULATOR. Description SNMP SIMULATOR Overview The SNMP Agent Simulator enables simulation of standalone SNMP agents to test and demonstrate SNMP-based management applications. Its unique ability to create default values from

More information

IDEAL : An IntegrateD REsource MAnagement Language

IDEAL : An IntegrateD REsource MAnagement Language : An IntegrateD REsource MAnagement Language Simon ZNATY 1, Omar CHERKAOUI 2 1 ENST-Bretagne, RSM Dept Rue de la Chataigneraie, BP 78 35512 Cesson-Sévigné, FRANCE E-mail : Simon.Znaty@enst-bretagne.fr

More information

SNMP and Network Management

SNMP and Network Management SNMP and Management Simple Management Protocol A Standard Protocol for Management SNMP how it was born In 1980 s, networks grew, hard to manage Many vendors, many protocols Many saw a need for standard

More information

SNMP: Simplified. White Paper by F5

SNMP: Simplified. White Paper by F5 The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Network management takes place between two major types of systems: those in control, called managing systems, and those observed and controlled, called managed systems. The most common managing

More information

Accounting management system enhancement supporting automated monitoring and storing facilities

Accounting management system enhancement supporting automated monitoring and storing facilities Accounting management system enhancement supporting automated monitoring and storing facilities Abstract C. Bouras S. Kastaniotis 1 Computer Engineering and Informatics Department University of Patras,

More information

Chapter 30 Network Management (SNMP)

Chapter 30 Network Management (SNMP) Chapter 30 Network Management (SNMP) Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 30-1 Overview Network Management SNMP Management information base (MIB) ASN.1 Notation

More information

Topology Discovery in Heterogeneous IP Networks

Topology Discovery in Heterogeneous IP Networks opology Discovery in Heterogeneous IP Networks Yuri Breitbart, Minos Garofalakis, Cliff Martin, Rajeev Rastogi, S. Seshadri, Avi Silberschatz Information Sciences Research Center Bell Labs, Lucent echnologies

More information

Chapter 18: Parallel Databases

Chapter 18: Parallel Databases Chapter 18: Parallel Databases Introduction Parallel machines are becoming quite common and affordable Prices of microprocessors, memory and disks have dropped sharply Recent desktop computers feature

More information

INTEGRATED MANAGEMENT OF LARGE SATELLITE-TERRESTRIAL NETWORKS' ABSTRACT

INTEGRATED MANAGEMENT OF LARGE SATELLITE-TERRESTRIAL NETWORKS' ABSTRACT INTEGRATED MANAGEMENT OF LARGE SATELLITE-TERRESTRIAL NETWORKS' J. S. Baras, M. Ball, N. Roussopoulos, K. Jang, K. Stathatos, J. Valluri Center for Satellite and Hybrid Communication Networks Institute

More information

Navigating Cisco Prime Campus Manager Tasks in LMS 4.1

Navigating Cisco Prime Campus Manager Tasks in LMS 4.1 CHAPTER 4 Navigating Cisco Prime Campus Manager Tasks in LMS 4.1 CiscoWorsk Campus Manager (CM) is an integral component of Cisco Prime LAN Management Solution. As an enterprise solution for network management,

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern

More information

May The Internet-standard Network Management Framework consists of three components. They are:

May The Internet-standard Network Management Framework consists of three components. They are: Network Working Group Request for Comments: 1229 K. McCloghrie, Editor Hughes LAN Systems, Inc. May 1991 Status of this Memo Extensions to the Generic-Interface MIB This RFC contains definitions of managed

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Network Management The network management is to Monitor the network Ensure the operations over the network are functional Assure the network works efficiently An

More information

Design and Analysis of a Proactive Application Management System (PAMS)

Design and Analysis of a Proactive Application Management System (PAMS) Design and Analysis of a Proactive Application Management System (PAMS) Salim Hariri HPDC Laboratory The Department of Electrical and Computer Engineering, University of Arizona Tucson, AZ 85721, USA Hariri@ece.arizona.edu,

More information

Introduction to Systems and Network Management

Introduction to Systems and Network Management Introduction to Systems and Network Management Shang Juh Kao Dept. of Computer Science and Engineering National Chung Hsing University Tel: 04-2284-0497 x 708 Email: sjkao@cs.nchu.edu.tw 1 This course

More information

SNMP Simple Network Management Protocol

SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:

More information

Network control and management

Network control and management Network control and management Network management What is network management?? Why is it needed? Mani Subramanian, Network Management: An introduction to principles and practice, Addison Wesley Longman,

More information

Configuring RMON. Understanding RMON CHAPTER

Configuring RMON. Understanding RMON CHAPTER 22 CHAPTER This chapter describes how to configure Remote Network Monitoring (RMON) on your switch. RMON is a standard monitoring specification that defines a set of statistics and functions that can be

More information

Overview of IPM. What Is IPM? CHAPTER

Overview of IPM. What Is IPM? CHAPTER CHAPTER 1 Overview of IPM This chapter provides an overview of Cisco s Internetwork Performance Monitor (IPM) application. It contains the following sections: What Is IPM? Key Terms and Concepts How Does

More information

Experimental Extensions to RSVP Remote Client and One-Pass Signalling

Experimental Extensions to RSVP Remote Client and One-Pass Signalling 1 Experimental Extensions to RSVP Remote Client and One-Pass Signalling Industrial Process and System Communications, Darmstadt University of Technology Merckstr. 25 D-64283 Darmstadt Germany Martin.Karsten@KOM.tu-darmstadt.de

More information

NET311 Computer Network Management Tools, Systems and Engineering

NET311 Computer Network Management Tools, Systems and Engineering NET311 Computer Network Management Tools, Systems and Engineering Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

Ethernet Switch ZyNOS 4.0

Ethernet Switch ZyNOS 4.0 RMON Ethernet Switch ZyNOS 4.0 Support Notes Version 4.00 July 2011 Overview Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to

More information

Mobile host protocols support host

Mobile host protocols support host INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 9 CHAPTER To have the sensor send SNMP traps, you must also choose Request SNMP Trap as the event action when you configure signatures. For more information, see Assigning Actions to Signatures, page 5-23.

More information

An Architecture for Network Resource Monitoring in a Distributed Environment

An Architecture for Network Resource Monitoring in a Distributed Environment An Architecture for Monitoring in a Distributed Environment Philip M. Irey IV, Robert W. Hott, David T. Marlow NSWC-DD Code B35 17320 Dahlgren Road Dahlgren, VA 22448-5100 pirey, rhott, dmarlow@nswc.navy.mil

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Request for Comments: 1901

Request for Comments: 1901 Network Working Group Request for Comments: 1901 Category: Experimental SNMPv2 Working Group J. Case SNMP Research, Inc. K. McCloghrie Cisco Systems, Inc. M. Rose Dover Beach Consulting, Inc. S. Waldbusser

More information

Chapter 11 - Data Replication Middleware

Chapter 11 - Data Replication Middleware Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 11 - Data Replication Middleware Motivation Replication: controlled

More information

Essay Question: Explain 4 different means by which constrains are represented in the Conceptual Data Model (CDM).

Essay Question: Explain 4 different means by which constrains are represented in the Conceptual Data Model (CDM). Question 1 Essay Question: Explain 4 different means by which constrains are represented in the Conceptual Data Model (CDM). By specifying participation conditions By specifying the degree of relationship

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and a

More information

Configuring IP SLAs TCP Connect Operations

Configuring IP SLAs TCP Connect Operations This module describes how to configure an IP Service Level Agreements (SLAs) TCP Connect operation to measure the response time taken to perform a TCP Connect operation between a Cisco router and devices

More information

Outline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol

Outline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol Outline SNMP Simple Network Management Protocol Several slides are courtesy of the Addison Wesley companion web site for textbook by Liebeherr and El Zarki and others added by M. Veeraraghavan, Univ. of

More information

NET311 Computer Network Management RMON

NET311 Computer Network Management RMON NET311 Computer Network Management RMON Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa Acknowledgements

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Location-Based Push Services in Wireless LAN Hotspots

Location-Based Push Services in Wireless LAN Hotspots Location-Based Push Services in Wireless LAN Hotspots Yen-Cheng Chen and Gang-Ming Fan Department of Information Management National Chi Nan University Puli, 545 Nantou, Taiwan ycchen@ncnu.edu.tw, berger@im.ncnu.edu.tw

More information

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics Simple Network Management Protocol Support, page 1 SNMP Basics, page 1 SNMP Management Information Base (MIB), page 2 Set Up SNMP, page 3 Import Previously Configured Windows SNMP v1 Community Strings,

More information

SilverCreek The World s Best-Selling SNMP Test Suite

SilverCreek The World s Best-Selling SNMP Test Suite SilverCreek The World s Best-Selling SNMP Test Suite What s Inside... SilverCreek SNMP Tests Test Coverage A Rich Toolset Extend, Customize, Diagnose, Analyze Testing options/customizations Creating Your

More information

SNMP Support on NFVIS

SNMP Support on NFVIS Introduction about SNMP, page 1 SNMP Operations, page 1 SNMP Versions, page 3 Configuring SNMP Support, page 3 Introduction about SNMP Simple Network Management Protocol (SNMP) is an application-layer

More information

Network Management Standards Architectures & Applications. Network Management

Network Management Standards Architectures & Applications. Network Management Network Management Standards Architectures & Applications Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management

More information

Getting Started with the VG248

Getting Started with the VG248 CHAPTER 2 Before you can configure the telephony features on the VG248 to interact with the analog phones, you must first configure the basic network, SNMP, and password settings. These settings enable

More information

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly

More information

DOWNLOAD PDF SQL SERVER 2005 FOR DEVELOPERS

DOWNLOAD PDF SQL SERVER 2005 FOR DEVELOPERS Chapter 1 : SQL Server Upgrade Considerations for DBAs and Developers Microsoft SQL Server Compact Edition (SQL Server Compact Edition) is designed for developers who need light weight, in process relational

More information

SilverCreek SNMP Test Suite

SilverCreek SNMP Test Suite SilverCreek SNMP Test Suite What's Inside: Executive Overview... 2 SilverCreek SNMP Tests... 2 Test Coverage:... 2 A Rich Toolset... 3 MIB Tools... 3 Traps, Alerts, Informs... 3 Utilities... 3 Diagnostic

More information

Table of Contents. Cisco TCP/IP

Table of Contents. Cisco TCP/IP Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing

More information

Lab Exercise - Introduction to Network Management. Objective of the exercise

Lab Exercise - Introduction to Network Management. Objective of the exercise Lab Exercise - Introduction to Network Management Objective of the exercise Introduce students to the basics of managing network resources, ie devices that are connected to the computer network. Theoretical

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

SNMP and Network Management

SNMP and Network Management Contents SNMP and Network Management Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions Nixu Ltd 2 Network management When you have 100s of computers in a network or are

More information

Simple Network Management Protocol

Simple Network Management Protocol 56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange

More information

MONitoring Agents using a Large Integrated Services Architecture. Iosif Legrand California Institute of Technology

MONitoring Agents using a Large Integrated Services Architecture. Iosif Legrand California Institute of Technology MONitoring Agents using a Large Integrated s Architecture California Institute of Technology Distributed Dynamic s Architecture Hierarchical structure of loosely coupled services which are independent

More information

Network Working Group Request for Comments: 1269 Wellfleet Communications Inc. October 1991

Network Working Group Request for Comments: 1269 Wellfleet Communications Inc. October 1991 Network Working Group Request for Comments: 1269 S. Willis J. Burruss Wellfleet Communications Inc. October 1991 Status of this Memo Definitions of Managed Objects for the Border Gateway Protocol (Version

More information

Conceptual & Concrete Architectures of Open Network Management System (OpenNMS)

Conceptual & Concrete Architectures of Open Network Management System (OpenNMS) Conceptual & Concrete Architectures of Open Management System (OpenNMS) Analyzed by BASEM SHIHADA University of Waterloo Dept. of Computer Science 200 University Avenue West Waterloo, Ontario, Canada (519)

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2 This document supports the version of each product listed and supports all subsequent versions until the document

More information

INTERNET NETWORK MANAGEMENT STANDARDS AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS

INTERNET NETWORK MANAGEMENT STANDARDS AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS INTERNET NETWORK MANAGEMENT STANDARDS COURSE PRESENTED AT THE SBRC 97 SÃO CARLOS, BRASIL 19-22 MAY 1997 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS pras@cs.utwente.nl http://wwwtios.cs.utwente.nl/~pras

More information

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science and Technology. 16.

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science and Technology. 16. Jaakko Kotimäki Department of Computer Science Aalto University, School of Science and Technology Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

Designing Issues For Distributed Computing System: An Empirical View

Designing Issues For Distributed Computing System: An Empirical View ISSN: 2278 0211 (Online) Designing Issues For Distributed Computing System: An Empirical View Dr. S.K Gandhi, Research Guide Department of Computer Science & Engineering, AISECT University, Bhopal (M.P),

More information

Distributed KIDS Labs 1

Distributed KIDS Labs 1 Distributed Databases @ KIDS Labs 1 Distributed Database System A distributed database system consists of loosely coupled sites that share no physical component Appears to user as a single system Database

More information

Introduction to the Catalyst 3920

Introduction to the Catalyst 3920 CHAPTER 1 Introduction to the Catalyst 3920 This chapter contains the following information about the Catalyst 3920: Product Overview Physical Characteristics of the Catalyst 3920 System Architecture Product

More information

SNMP and Network Management

SNMP and Network Management SNMP and Network Management Nixu Ltd Contents Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions 2 Network management When you have 100s of computers in a network or are

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Cisco Security Monitoring, Analysis and Response System 4.2

Cisco Security Monitoring, Analysis and Response System 4.2 Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

SNMP SNMP Overview CHAPTER

SNMP SNMP Overview CHAPTER CHAPTER 18 This chapter explains Simple Network Management Protocol () as implemented by the Cisco ONS 15454. For setup information, refer to the Cisco ONS 15454 Procedure Guide. Chapter topics include:

More information

Network Working Group Request For Comments: 1304 Editors Bell Communications Research February 1992

Network Working Group Request For Comments: 1304 Editors Bell Communications Research February 1992 Network Working Group Request For Comments: 1304 T. Cox K. Tesink Editors Bell Communications Research February 1992 Definitions of Managed Objects for the SIP Interface Type Status of this Memo This RFC

More information

Avaya C460 SMON User Guide

Avaya C460 SMON User Guide Avaya C460 SMON User Guide August 2003 Avaya C460 SMON 5.2 User Guide Copyright 2003 Avaya Inc. All Rights Reserved The products, specifications, and other technical information regarding the products

More information

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point.

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. CHAPTER 18 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. Note For complete syntax and usage information for the commands used in this chapter,

More information

' There is yet another category of data that are defined and used

' There is yet another category of data that are defined and used Ensuring Data Consistency in Large Network Systems Weimin Du Cisco Systems 250 West Tasman Drive, San Jose, CA 95 134, USA du@cisco.com Abstract Data management in network systems is different from that

More information

A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3

A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3 Choong Seon Hong and Joon Heo School of Electronics and Information, Kyung Hee University 1 Seocheon,

More information

Operations. Notifications Behavior. (c) Internet Object Definition. (d) OSI object Definition.

Operations. Notifications Behavior. (c) Internet Object Definition. (d) OSI object Definition. In Integrated Network Management, III (H.G. Hegering and Y. Yemini (eds.)), pp. 389-401, Amsterdam: North-Holland, 1993. An Application Gateway Design for OSI-Internet Management Pramod Kalyanasundaram

More information

Network Management. Raj Jain Raj Jain. Washington University in St. Louis

Network Management. Raj Jain Raj Jain. Washington University in St. Louis Network Management Raj Jain Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-09/

More information

Point-to-Multipoint MPLS-TE MIB

Point-to-Multipoint MPLS-TE MIB The point-to-multipoint (P2MP) Multiprotocol Label Switching (MPLS)-traffic engineering (TE) MIB describes the Label Switched Path (LSP) in an IP MPLS network. An administrator can use the P2MP MPLS-TE

More information

SNMP CEF-MIB Support

SNMP CEF-MIB Support SNMP CEF-MIB Support Last Updated: October 5, 2011 The Cisco Express Forwarding--SNMP CEF-MIB Support feature introduces the CISCO-CEF-MIB, which allows management applications through the use of the Simple

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

CounterACT Switch Plugin

CounterACT Switch Plugin CounterACT Switch Plugin Version 8.9.5 Table of Contents About the Switch Plugin... 5 Plugin Architecture... 5 Communication between the Switch Plugin and Switches... 6 Multi-Process Switch Plugin Architecture...

More information

Monitoring Edge-to-Edge Traffic Aggregates in Differentiated Services Networks

Monitoring Edge-to-Edge Traffic Aggregates in Differentiated Services Networks Journal of Network and Systems Management, Vol. 9, No. 3, September 2001 ( 2001) Monitoring Edge-to-Edge Traffic Aggregates in Differentiated Services Networks Jae-Young Kim, 1 James Won-Ki Hong, 1 and

More information

WebNMS White Paper Motorola (NSN) Element Manager HRPDA (EMH)

WebNMS White Paper Motorola (NSN) Element Manager HRPDA (EMH) Motorola EVDO Data Call Management system named EMH Element Manager HRPDA has two types of Network Elements, namely the Shelf-M Software residing in an ATCA Cage hardware and MCC-DO Software that are installed

More information

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Bonus Content. Glossary

Bonus Content. Glossary Bonus Content Glossary ActiveX control: A reusable software component that can be added to an application, reducing development time in the process. ActiveX is a Microsoft technology; ActiveX components

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2017 TOC 1 SNMPv1 Messages 2 SNMP messages Two main purposes: Monitoring and configuration. SNMP version 1 defines five

More information

B.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION. Ch. 1 :- Introduction Database Management System - 1

B.H.GARDI COLLEGE OF MASTER OF COMPUTER APPLICATION. Ch. 1 :- Introduction Database Management System - 1 Basic Concepts :- 1. What is Data? Data is a collection of facts from which conclusion may be drawn. In computer science, data is anything in a form suitable for use with a computer. Data is often distinguished

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

Enabling Location-Based Services on Wireless LANs

Enabling Location-Based Services on Wireless LANs Enabling Location-Based Services on Wireless LANs Yen-Cheng Chen, Yao-Jung Chan, and Cheung-Wo She Department of Information Management National Chi Nan University Puli, 545 Nantou, Taiwan ycchen@ncnu.edu.tw

More information

Cisco TelePresence Exchange System

Cisco TelePresence Exchange System Data Sheet Cisco TelePresence Exchange System Product Overview The Cisco TelePresence Exchange System is an integrated telepresence and video service-creation platform that can help service providers and

More information

IP Accounting C H A P T E R

IP Accounting C H A P T E R C H A P T E R 6 IP Accounting This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details. This chapter

More information

Understanding SNMP. Overview. Supported MIBs RADIUS-AUTH-CLIENT-MIB CHAPTER

Understanding SNMP. Overview. Supported MIBs RADIUS-AUTH-CLIENT-MIB CHAPTER CHAPTER 6 This chapter provides information about Cisco Access Registrar support for SNMP. Overview Cisco Access Registrar 1.7 includes enhancements that provide SNMP MIB and trap support for users of

More information

Applications of SNMP in Ubiquitous Environment

Applications of SNMP in Ubiquitous Environment Applications of SNMP in Ubiquitous Environment Syed Shariyar Murtaza 1, Syed Obaid Amin 2, Choon Seon Hong 3 1 shariyar@networking.khu.ac.kr,obaid@networking.khu.ac.kr,cshong@khu.ac.kr Abstract Ubiquitous

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

An Experimental Analysis on OSPF-TE Convergence Time

An Experimental Analysis on OSPF-TE Convergence Time An Experimental Analysis on OSPF-TE Convergence Time S. Huang* a, K. Kitayama a, F. Cugini b, F. Paolucci c, A. Giorgetti c, L. Valcarenghi c, P. Castoldi c a Osaka University, Osaka, Japan; b CNIT, Pisa,

More information

Replication. Some uses for replication:

Replication. Some uses for replication: Replication SQL Server 2000 Replication allows you to distribute copies of data from one database to another, on the same SQL Server instance or between different instances. Replication allows data to

More information

Configuring IP SLAs TCP Connect Operations

Configuring IP SLAs TCP Connect Operations Configuring IP SLAs TCP Connect Operations Finding Feature Information Configuring IP SLAs TCP Connect Operations Last Updated: March 22, 2011 This module describes how to configure an IP Service Level

More information

Enabling Seamless Sharing of Data among Organizations Using the DaaS Model in a Cloud

Enabling Seamless Sharing of Data among Organizations Using the DaaS Model in a Cloud Enabling Seamless Sharing of Data among Organizations Using the DaaS Model in a Cloud Addis Mulugeta Ethiopian Sugar Corporation, Addis Ababa, Ethiopia addismul@gmail.com Abrehet Mohammed Omer Department

More information

System for Large Computing Clusters

System for Large Computing Clusters (Towards) A Scalable Monitoring System for Large Computing Clusters Moreno Marzolla Email marzolla@dsi.unive.it Web: http://www.dsi.unive.it/~marzolla Dip. Informatica, Università di Venezia Talk Outline

More information