Managing Networks with the Global Naming Tree Gilbert Held

Size: px
Start display at page:

Download "Managing Networks with the Global Naming Tree Gilbert Held"

Transcription

1 Managing Networks with the Global Naming Tree Gilbert Held Payoff An often-overlooked and hidden-from-view characteristic of network management systems is their use of the global naming tree. An understanding of the global naming tree's structure and the addressing method used to locate objects (i.e., network devices) can make it easier for network administrators to effectively support different network management systems. Introduction Tree structures are a common method for accessing information. The reason for the use of a tree structure is that the path from the root via one or more branches to a leaf provides a unique method for addressing information stored at the end of the path. The most common use of a tree structure inverts the tree, placing the root at the top. From the root, one or more branches flow downward and separate into sub-branches. This subdivision can theoretically continue indefinitely, with the major restriction being the number of characters, digits, or identifiers that can be used to define a path through the tree. The most commonly used tree structure employed in computer-based systems provides data management in the form of a directory structure. When used to manage data within a directory structure, the root of the tree represents the top of the directory, while subdirectories represent branches under the root. Another common tree structure is employed by data base management systems. The International Standards Organization (ISO) and the International Telecommunications Union-Telecommunications Standardization Sector (ITU-TSS) have jointly developed a tree-based structure for assigning unique identifiers to different types of objects. That tree is known as a global naming tree. Structure of the Global Naming Tree Objects in the global naming tree can represent any type of information. In addition, the tree structure makes it possible for network managers to delegate responsibility for information structuring to other organizations under different nodes within the global naming tree. Use in Network Management Applications Exhibit 1 illustrates the basic structure of the global naming tree that is oriented toward its use in network management applications. Under the root are three top-level nodes. The Network Management Portion of the Global Naming Tree As Exhibit 1 shows, each node in the tree has both a label and a numeric identifier. The top-level nodes indicate the organization that administers the subtree under the node. The three top-level nodes allow the International Telecommunications Union, International

2 Standards Organization, and the ISO and ITU jointly to administer distinct portions of the global naming tree. The third node (Org) under the ISO node was defined as a mechanism to delegate authority to other organizations. One of those organizations is the US Department of Defense (DOD), which is the sixth node under the Org node. Because the US Department of Defense initially funded the Advanced Research Projects Agency network (ARPAnet), which is considered as the predecessor to the Internet, and still provides a degree of administrative and operational support for certain Internet activities, the first node under the DoD node is the Internet node. The Internet node and the subtree residing under it is owned by the Internet Activities Board (IAB) and administered by the Internet Assigned Numbers Authority (IANA). The IANA is responsible for maintaining a document of assigned numbers, which tracks the complete set of parameters used in the Transmission Control Protocol/Internet protocol (TCP/IP) suite to include addresses in the Internet subtree that identify simple network management protocol (SNMP) and Remote MONitoring objects. Organizations that wish to develop extensions to SNMP and remote monitoring (RMON) standard objects are assigned distinct identifiers within the Internet subtree. The Internet Subtree Currently, six nodes are defined under the Internet node directory, management, experimental, private, security, and SNMPV2. Two of those nodes, security and SNMPV2, are being standardized and may not be completely defined for a few years. The experimental node provides a location for the placement of newly developed and unproved objects. After a trial period, objects deemed to be useful are then moved to a standardized location under the management subtree. That tree (Mgmt) is used to hold all standardized network management variables and represents the portion of the global naming tree most network management systems are designed to work with. The private subtree represents a location where equipment vendors, software developers, universities, and government agencies can develop extensions to SNMP. To do so, an organization is assigned a node under private/enterprises that represents an assigned subtree within the global naming tree. Within that subtree, an organization is free to define its own structure for product identifiers and Management Information Base object definitions that are required to manage a specific product or group of products. Because it is almost impossible for any one network management product to be aware of every vendor-specific set of managed objects located under the private/enterprise node, the use of these path identifiers gives network managers and administrators a way to walk through the global naming tree structure, so they can set or retrieve information from any vendor subtree. This is a capability network managers might not otherwise obtain by relying on the standard features of a network management system. The MIB Subtree The SNMP standard defines a data base of network management information as a management information base (MIB). The management information base (MIB) consists of a combination of hardware and software settings that represent objects needed to manage different types of products. To simplify network management, objects were organized into units known as groups. Groups have a common management function. Depending on the operating characteristics of a device, it may or may not support one or more of the groups shown

3 under the management information base (MIB)-2 node in Exhibit 1. (The original management information base (MIB) for managing a TCP/IP network is known as management information base (MIB)-1; its new version is labeled Management Information Base-2. management information base (MIB)-2 is recognized by the IANA under the management node in the global naming tree.) Object Groups. The system group permits configuration information to be defined to include what the device is, where it is located, and the person or persons to call when something goes wrong. Because of the importance of the system group, it is required to be supported by every device. In comparison, other groups are optional and are only required to be implemented if applicable to a specific device. Examples of optional groups include: IP group, which includes objects needed for the configuration and management of Internet protocol hosts and routers. The TCP group, which is applicable to TCP devices. The UDP group, which is applicable for devices that support User Datagram Protocol. One group that requires some explanation is the transmission group. This group more correctly represents a node position in the global naming tree under which groups applicable to different transmission technologies are placed. Three examples of transmission technologies are shown in Exhibit 1 under the transmission node--dot3, DOT5, and FDDI. The DOT3 and DOT5 nodes reference local area networks standardized by the IEEE as 802.3and Those standards are better known as Ethernet and Token Ring. Assigning Identifiers and Managing Objects Each object in a device to be managed is represented by a unique address within the global naming tree. That address, which is referred to as an object identifier in standards documents, can be expressed in several ways. The most commonly used method to express an object identifier is through the use of a string of integers separated by dots to form a path to the object. For example, the path to the system group shown in Exhibit 1 would be The first object in that group would be located at in the global naming tree. Some object identifiers can have more than one value. For example, a bridge or router would have at least two interfaces, which would make it necessary to append a digit to the identifier path to denote the specific interface the administrator wishes to retrieve information from. However, many objects represent a one-of-a-kind value, such as the location of a device. To provide consistency, an index is always added at the end of an identifier. Thus, if the object is a one-of-a-kind object, the administrator would add a zero (0) to its path. Because the first object in the system group is a one-of-a-kind object, its path identifier becomes The omission of the trailing zero is a common error when users of a network management system use path addresses to retrieve object values.

4 Other methods used for object identifiers can include linking text labels with underscores or combinations of text labels and numerics. Because programming operations are easier and faster when working with numerics rather than text identifiers, most network management systems that allow users to enter tree identifiers do so by supporting integer strings with dots used as separators. Standardization and Its Benefits In actuality, there are two types of addresses network administrators need to assign to manage a device. The first address is the IP address of a device installed in a network, which defines its location. The second address is the set of addresses within the global naming tree that defines the location of counters, registers, and memory locations that the administrator may be able to read from, write into, or read and write, depending on the access method defined for the object. By having a standard method for defining objects in the global naming tree, different vendors can independently develop managed objects, avoiding the potential for the occurrence of addressing conflicts. In addition, vendors can design their products to support applicable SNMP and Remote MONitoring groups in a standardized manner, and other vendors can develop network management systems without having to know full details of different vendor products. In short, if a network management system supports the global naming tree structure, any user who understand tree addressing concepts is able to read, write, or read and write to and from different managed devices manufactured by different vendors. Sample Application Using Sample Tool For purposes of further illustrating the use of the global naming tree in network management operations, this section uses the example of an application developed using SimpleView from Triticom (Eden Prairie MN). To use this program to manage an object, the user must first select the object. The screen shot in Exhibit 2 shows that the Ethernet probe at IP address was selected. Exhibit 3 represents the values of object identifiers in the system group of the Ethernet probe. This system group contains seven object identifiers.

5 Notes: Although the system group must be included in every managed device, the setting of some objects in the system group will depend on the user of the device. The syscontact identifier could be set by the organization using the device. Some organizations will set this identifier while others may elect to leave it at its default Not Set string value. The location is the object identification number. If the object (e.g., sysuptime) is a one-ofa-kind object, tools such as SimpleView automatically append a zero (0) to the path address. Object Identifier Location Description sysdescr A text description about the device. sysobjectid An identifier assigned to the device by its vendor. sysuptime The time in hundredths of a second since the system was last reinitialized. syscontact The person responsible for the device. sysname An administratively assigned name. syslocation The physical location of the device. sysservices A coded number which indicates the layer in the ISO model at which device performs services. Notes: Although the system group must be included in every managed device, the setting of some objects in the system group will depend on the user of the device. The syscontact identifier could be set by the organization using the device. Some organizations will set this identifier while others may elect to leave it at its default Not Set string value. The location is the object identification number. If the object (e.g., sysuptime) is a one-of-a-kind object, tools such as SimpleView automatically append a zero (0) to the path address. Tools such as SimpleView allow a network administrator to retrieve basic SNMP or Remote MONitoring information. Because there are more than 1,000 vendors that are assigned subtrees under the private enterprises node in the global naming tree (which would make their support difficult, if not impossible, to accomplish via a menu that identifies the name of each object identifier), the sample tool uses a series of SNMP commands to access information in managed objects developed by different vendors. The Get, Get Next, and Set entries shown in the Manage menu in Exhibit 2 represent three SNMP commands. The Get command is used to request the values of one or more Management Information Base variables. The Get Next command is used to read values sequentially. By selecting the Get Next command, the user can either go directly to a specific tree address (by typing in the address) or, if they do not know the address, browse predefined portions of the global naming tree that locate commonly used objects. The third SNMP command supported, the Set command, allows the network administrator to update one or more management information base (MIB) values.

6 Once a command is executed, SimpleView displays the results in the program's Trap Log. Exhibit 4 shows an entry that occurred as a result of the execution of the Get Next command using a tree address to retrieve the value of the object. Although the time is displayed in hundredths of a second, such tools can also convert that time into days, hours, minutes, and seconds. By issuing several Get Next Commands, the values for sysname and subsequent objects in the group would also be displayed in the Trap Log. Thus, once the user knows an address they can walk through a path using a series of Get Next commands to retrieve subsequent object values. SimpleView Trap Log Window Conclusion The global naming tree provides a mechanism for labeling and identifying objects while eliminating the possibility of addressing conflicts. By understanding how to use path addresses in conjunction with object identifier information, network administrators can manage any device that complies with the global naming tree method for identifying objects. The easiest way to retrieve information from proprietary products developed to comply with the global naming tree is for the user to refer to the device user manual to determine the path to different managed objects in the device. Author Biographies Gilbert Held Gilbert Held is director of 4-Degree Consulting, a Macon GA-based high-tech consulting group. He is an internationally recognized author and lecturer. He has written more than 40 books and 300technical articles and received numerous awards for excellence in technical writing.

7

8

9

SNMP and Network Management

SNMP and Network Management SNMP and Network Management Nixu Ltd Contents Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions 2 Network management When you have 100s of computers in a network or are

More information

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-10-06 DATA COMMUNICATIONS MANAGEMENT VIRTUAL LANS Gilbert Held INSIDE Definition, Rationale, Support for Virtual Networking Requirements, Facilitating Adds, Moves, and Changes, Enhancing Network Performance,

More information

SNMP and Network Management

SNMP and Network Management Contents SNMP and Network Management Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions Nixu Ltd 2 Network management When you have 100s of computers in a network or are

More information

Using Windows NT in a NetWare Environment Gilbert Held

Using Windows NT in a NetWare Environment Gilbert Held Previous screen 50-20-40 Using Windows NT in a NetWare Environment Gilbert Held Payoff For companies that require Windows NT clients to work in a NetWare environment, getting the configuration setup right

More information

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Arquitecturas de Redes 3 Gestão de Redes e Serviços -

More information

Outline Network Management MIB naming tree, MIB-II SNMP protocol Network management in practice. Network Management. Jaakko Kotimäki.

Outline Network Management MIB naming tree, MIB-II SNMP protocol Network management in practice. Network Management. Jaakko Kotimäki. Outline MIB naming tree, MIB-II SNMP protocol Network management in practice 19.10.2010 Outline MIB naming tree, MIB-II SNMP protocol Network management in practice Outline Contents MIB naming tree, MIB-II

More information

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science and Technology. 16.

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science and Technology. 16. Jaakko Kotimäki Department of Computer Science Aalto University, School of Science and Technology Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in

More information

SNMP. Agenda. Network Management Basics SNMP. RMON SNMPv2 Product Examples L64 - SNMP. Simple Network Management Protocol. Basics SMI MIB.

SNMP. Agenda. Network Management Basics SNMP. RMON SNMPv2 Product Examples L64 - SNMP. Simple Network Management Protocol. Basics SMI MIB. SNMP Simple Network Management Protocol Agenda Network Management Basics SNMP Basics SMI MIB RMON SNMPv2 Product Examples SNMP, v4.0 2 Page 64-1 What is it? A network management should... automate the

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2017 TOC 1 SNMPv1 Messages 2 SNMP messages Two main purposes: Monitoring and configuration. SNMP version 1 defines five

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

Simple Network Management Protocol

Simple Network Management Protocol 56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange

More information

Lecture 18: Network Management

Lecture 18: Network Management Lecture 18: Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 18-1 Objective Manage a network by managing its components: routers, bridges,

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Network Management The network management is to Monitor the network Ensure the operations over the network are functional Assure the network works efficiently An

More information

SNMP and Network Management

SNMP and Network Management SNMP and Management Simple Management Protocol A Standard Protocol for Management SNMP how it was born In 1980 s, networks grew, hard to manage Many vendors, many protocols Many saw a need for standard

More information

SNMP Simple Network Management Protocol

SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:

More information

SNMPv2 Object Descriptions

SNMPv2 Object Descriptions CHAPTER 7 This chapter describes the individual MIB objects that comprise SNMPv2. The objects reside in the SNMPv2-MIB.my file. Contents of this chapter include: System Group Object Resource Information

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Network management takes place between two major types of systems: those in control, called managing systems, and those observed and controlled, called managed systems. The most common managing

More information

A Brief Introduction to Internet Network Management. Geoff Huston

A Brief Introduction to Internet Network Management. Geoff Huston A Brief Introduction to Internet Network Management Geoff Huston gih@telstra.net What are we talking about? Network Management Tasks fault management configuration management performance management security

More information

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held 5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems

More information

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an

More information

Management Information Base

Management Information Base Management Information Base Management of a network involves reading and setting many networkrelated values, as we evaluate the network performance and adjust its operation. The management values are held

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2017 TOC 1 MIBs 2 Review Managed objects are the network components to be managed (monitored and/or configured). To

More information

Brief Introduction to the Internet Standard Management Framework

Brief Introduction to the Internet Standard Management Framework Part 2: Structure of Management Information Version 2 (SMIv2) The SMI is the Data Definition Language, based loosely on an old version of ASN.1 and used to model and define management information to be

More information

SNMP overview. Network Mgmt/Sec. Jim Binkley 1

SNMP overview. Network Mgmt/Sec. Jim Binkley 1 SNMP overview Network Mgmt/Sec. 1 Outline snmp components architecture/mibs/naming protocol security snmp history and versions summary 2 snmp elements client/server - architecture database elements (MIB)

More information

Network Management & Monitoring Introduction to SNMP

Network Management & Monitoring Introduction to SNMP Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Network Management & Monitoring Introduction to SNMP

Network Management & Monitoring Introduction to SNMP Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 10: SNMP and AAA Literature: Forouzan, chapter 23 RFC2881 RFC2905 RFC2903 Diameter next generation's AAA protocol by Håkan Ventura (handouts) 2004 Image Coding Group, Linköpings Universitet Lecture

More information

The Corporate Intranet Gilbert Held

The Corporate Intranet Gilbert Held 51-10-52 The Corporate Intranet Gilbert Held Payoff The growth in the popularity of the Internet has significantly influenced software product development users today can access search tools and browsers

More information

NET311 Computer Networks Management Standards, Models and Language

NET311 Computer Networks Management Standards, Models and Language NET311 Computer Networks Management Standards, Models and Language Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

RMON MIB. Presenter: Andreas Pitsillides. Based on presentation by Rouf Boutaba

RMON MIB. Presenter: Andreas Pitsillides. Based on presentation by Rouf Boutaba RMON MIB Presenter: Andreas Pitsillides Based on presentation by Rouf Boutaba 1 The RMON MIB Objectives Introduction Segment Statistics Statistics Other RMON MIB Groups Summary 2 RMON MIB - Objectives

More information

Redesde Computadores(RCOMP)

Redesde Computadores(RCOMP) Redesde Computadores(RCOMP) Lecture 11 2016/2017 Network management. SMTP application protocol. Instituto Superior de Engenharia do Porto Departamento de Engenharia Informática Redes de Computadores (RCOMP)

More information

Lecture 11: Introduction to Network Management

Lecture 11: Introduction to Network Management Lecture 11: Introduction to Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 11-1 Objective Manage a network by managing its components: routers,

More information

Networking Protocol Stack

Networking Protocol Stack Lecture Computer Communications & Networks 03 Networking Protocol Stack Dr. Muhammad Yousaf Assistant Professor, Faculty of Computing, Riphah International University, Islamabad Networking Protocols Set

More information

COSC 301 Network Management

COSC 301 Network Management COSC 301 Network Management Lecture 20: Management Tools and Protocols Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 20: Management tools and protocols 1 What is Network Management?

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

CorreLog. SNMP Trap Monitor Software Users Manual

CorreLog. SNMP Trap Monitor Software Users Manual CorreLog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No

More information

Internetworking. from the Webopedia Computer Dictionary

Internetworking. from the Webopedia Computer Dictionary Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Outline Overview Protocol MIB Net-SNMP Network Management Tools Client Application Development 2 Network Management How to monitor your servers? Trying to use the

More information

HyperText Transfer Protocol. HTTP Commands. HTTP Responses

HyperText Transfer Protocol. HTTP Commands. HTTP Responses Hyper Transfer Protocol HTTP - just a different file transfer protocol Simplified, standard client/server model just one connection for commands and data Data transferred is structured Similar to MIME

More information

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2017-05-22 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Titlepage. JMibTools. Document 1426 Network Management

Titlepage. JMibTools. Document 1426 Network Management Titlepage JMibTools Document 1426 Network Management Copyright Notice Document 1426. Copyright August 2002 by Aprisma Management Technologies, Inc. All rights reserved worldwide. Use, duplication, or disclosure

More information

Configuring Simple Network Management Protocol (SNMP)

Configuring Simple Network Management Protocol (SNMP) CHAPTER 5 Configuring Simple Network Management Protocol (SNMP) This chapter provides information on configuring Simple Network Management Protocol (SNMP) features of your CSS. It also provides a brief

More information

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information

Cisco Nexus 7000 Series NX-OS MIB Quick Reference

Cisco Nexus 7000 Series NX-OS MIB Quick Reference Cisco Nexus 7000 Series NX-OS MIB Quick Reference Date: August, 2013 This document describes the private, or local, Management Information Base (MIB) files for the Cisco NX-OS software. This document provides

More information

Introduction to Internetworking

Introduction to Internetworking CHAPTER Introduction to Internetworking Introduction This chapter explains basic internetworking concepts. The information presented here helps readers who are new to internetworking comprehend the technical

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?

More information

x25 remote-red x25 remote-red This command is no longer supported. Cisco IOS Wide-Area Networking Command Reference WR

x25 remote-red x25 remote-red This command is no longer supported. Cisco IOS Wide-Area Networking Command Reference WR x25 remote-red x25 remote-red This command is no longer supported. WR-553 x25 retry x25 retry To activate a secondary route while also retrying a failed primary route, use the x25 retry interface configuration

More information

SNMP Agent Plug-In PTC Inc. All Rights Reserved.

SNMP Agent Plug-In PTC Inc. All Rights Reserved. 2018 PTC Inc. All Rights Reserved. 2 Table of Contents SNMP Agent Plug-In 1 Table of Contents 2 SNMP Agent Plug-In 4 Overview 4 Agent Setup 5 General 5 Network Interfaces 7 Communication 8 Agent Actions

More information

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite Need For Protocol Architecture E.g. File transfer Source must activate comms. Path or inform

More information

NAM CLI Commands: show patches - web user

NAM CLI Commands: show patches - web user CHAPTER 6 NAM CLI Commands: show patches - web user This chapter describes the following NAM CLI commands: show patches show preferences show protocol-feature show remote-storage show rxcounters show snmp

More information

SNMP: Simplified. White Paper by F5

SNMP: Simplified. White Paper by F5 The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white

More information

INTERNET NETWORK MANAGEMENT STANDARDS AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS

INTERNET NETWORK MANAGEMENT STANDARDS AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS INTERNET NETWORK MANAGEMENT STANDARDS COURSE PRESENTED AT THE SBRC 97 SÃO CARLOS, BRASIL 19-22 MAY 1997 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS pras@cs.utwente.nl http://wwwtios.cs.utwente.nl/~pras

More information

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Internetworking. from the Webopedia Computer Dictionary

Internetworking. from the Webopedia Computer Dictionary Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely

More information

Ethernet Switch ZyNOS 4.0

Ethernet Switch ZyNOS 4.0 RMON Ethernet Switch ZyNOS 4.0 Support Notes Version 4.00 July 2011 Overview Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to

More information

Society of Cable Telecommunications Engineers

Society of Cable Telecommunications Engineers Society of Cable Telecommunications Engineers ENGINEERING COMMITTEE HFC Management Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 84-1 2009 HMS Common Inside Plant Management Information Base (MIB)

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet

More information

Introduction. Catalyst 2800 and SNMP Management Platforms CHAPTER

Introduction. Catalyst 2800 and SNMP Management Platforms CHAPTER CHAPTER 1 Introduction This manual describes how to configure and manage Catalyst 2000 switches using a standard SNMP-based network-management application. This manual also describes the standard MIB objects

More information

Network Management. Raj Jain Raj Jain. Washington University in St. Louis

Network Management. Raj Jain Raj Jain. Washington University in St. Louis Network Management Raj Jain Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-09/

More information

June The Internet-standard Network Management Framework consists of three components. They are:

June The Internet-standard Network Management Framework consists of three components. They are: Network Working Group Request for Comments: 1472 F. Kastenholz FTP Software, Inc. June 1993 Status of this Memo The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol

More information

NAM CLI Commands: show password strong-policy - web user

NAM CLI Commands: show password strong-policy - web user CHAPTER 6 NAM CLI Commands: show password strong-policy - web user This chapter describes the following NAM CLI commands: show password strong-policy show patches show pkt-drop counters show preferences

More information

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2014-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Chapter 3. Basic Foundations: Standards, Models, and Language. Presented by: Dr. Baha Alsaify

Chapter 3. Basic Foundations: Standards, Models, and Language. Presented by: Dr. Baha Alsaify Chapter 3 Basic Foundations: Standards, Models, and Language Presented by: Dr. Baha Alsaify Outline SNMP Management communication protocol ASN.1 language Basic encoding rules Management application functions

More information

Network Imaging Techniques Gilbert Held

Network Imaging Techniques Gilbert Held 51-20-60 Network Imaging Techniques Gilbert Held Payoff Supporting imaging applications does not necessarily require an expensive network upgrade. This article discusses several inexpensive, timesaving

More information

Network Management & Monitoring Introduction to SNMP

Network Management & Monitoring Introduction to SNMP Network Management & Monitoring Introduction to SNMP Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license

More information

DC70 NETWORK MANAGEMENT DEC 2015

DC70 NETWORK MANAGEMENT DEC 2015 Q.2 a. Discuss the OSI protocol architecture in detail. List out, at least one salient service provided by each layer (8) IETE 1 IETE 2 b. Identify the various network management functions and the groups

More information

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SNMP PROXY AGENT FEATURE

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SNMP PROXY AGENT FEATURE COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SNMP PROXY AGENT FEATURE USER S GUIDE Document No. 6700-A2-GB20-20 December 1997 Copyright 1997 Paradyne Corporation. All rights reserved. Printed in U.S.A.

More information

This document provides the following information:

This document provides the following information: 3Com(R) Network Supervisor Version 5.1 (Service Pack 2) (Product #: 3C15100E) This document provides the following information: 1. Legal 2. About This Software 3. System Requirements 4. Enhancements in

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

CISCO CONTEXT-BASED ACCESS CONTROL

CISCO CONTEXT-BASED ACCESS CONTROL 51-10-41 DATA COMMUNICATIONS MANAGEMENT CISCO CONTEXT-BASED ACCESS CONTROL Gilbert Held INSIDE Operation; Intersection; The Inspect Statement; Applying the Inspection Rules; Using CBAC OVERVIEW Until 1999,

More information

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1 Networking Basics EC512 Spring 2015 2/15/2015 EC512 - Prof. Thomas Skinner 1 Protocols Protocols are required in order to allow information to be extracted from the stream of bits flowing from one point

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and a

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

COMPUTER AND DATA NETWORKS

COMPUTER AND DATA NETWORKS COMPUTER AND DATA NETWORKS (EE2.CDN, Spring 2003) Dr. Z. SUN University of Surrey Guildford Surrey GU2 5XH Tel: 01483 68 9493 Fax: 01483 68 6011 Email: Z.Sun@eim.surrey.ac.uk 1 Dr.Z.Sun SCHEDULE Week 1

More information

CS 455 Internet Architecture, Page 3 ffl By 1985, the ARPANET was heavily used and congested; the National Science Foundation (NSF) initiated the NSFN

CS 455 Internet Architecture, Page 3 ffl By 1985, the ARPANET was heavily used and congested; the National Science Foundation (NSF) initiated the NSFN CS 455 Internet Architecture, Page 1 Network Layer, Part 3 Internet Architecture These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU

More information

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview

More information

products. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO).

products. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO). CBCN4103 Open Systems Interconnection (OSI) is a standard d description or "reference model" for how messages should be transmitted between any two points in a telecommunication network. Its purpose is

More information

Types of Transfer. Connection-oriented Transfer. Connectionless Transfer. Networks generally provide two types of communication. Connection-oriented

Types of Transfer. Connection-oriented Transfer. Connectionless Transfer. Networks generally provide two types of communication. Connection-oriented Types of Transfer Networks generally provide two types of communication Connection-oriented reliable stream based Connectionless unreliable datagram based CSCI 342 - Networking Connection-oriented Transfer

More information

Teh Interwebs CISC 282. September 13, The Internet/WWW

Teh Interwebs CISC 282. September 13, The Internet/WWW Teh Interwebs CISC 282 September 13, 2017 The Internet/WWW Network Protocol Collection of connected computers Communicate and share resources Set of rules that govern communication The "language" spoken

More information

SIMATIC NET. Network management Diagnostics and configuration with SNMP. Preface SNMP 1. Management Information Base (MIB)

SIMATIC NET. Network management Diagnostics and configuration with SNMP. Preface SNMP 1. Management Information Base (MIB) Preface SNMP 1 SIMATIC NET Network management Diagnostics and configuration with SNMP Diagnostics Manual Management Information Base (MIB) 2 Diagnostics and configuration 3 Siemens Automation MIB 4 LLDP-FMP-Extension

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

CONTENT of this CHAPTER

CONTENT of this CHAPTER CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.4.1 Problems in the Network??????? Is it a host problem? Weird switch behavior? Misconfigured box? (proxy?) Is a box out of service? Some networks

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

This talk will cover the basics of IP addressing and subnetting. Topics covered will include: This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?

More information

Operation Manual SNMP. Table of Contents

Operation Manual SNMP. Table of Contents Table of Contents Table of Contents... 1-1 1.1 SNMP Overview... 1-1 1.1.1 Introduction to SNMP... 1-1 1.1.2 SNMP Versions and Supported MIB... 1-1 1.2 Configuring SNMP... 1-3 1.2.1 Setting Community Names...

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This

More information

Author: Bill Buchanan. Wireless LAN. Unit 3: Wireless Infrastructure

Author: Bill Buchanan. Wireless LAN. Unit 3: Wireless Infrastructure Wireless LAN Unit 3: Wireless Infrastructure Areas covered: Wireless Infrastructures. Basic details on bridging and topologies. Wireless Data Logging and Device Discovery. Details on protocols such as

More information

INTRODUCTION TO WINDOWS 2000

INTRODUCTION TO WINDOWS 2000 50-30-31 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO WINDOWS 2000 Gilbert Held INSIDE Versions; Features; New Features; Graphic Improvements; Active Directory; Encryption and Compression; Disk Quotas;

More information

QWEST Communications International Inc. Technical Publication

QWEST Communications International Inc. Technical Publication QWEST Communications International Inc. Technical Publication Customer Network Management for QWEST Frame Relay Service and QWEST Switched Multimegabit Data Service Copyright 1994, 1996, 2001 77376 QWEST

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Microsoft Corporation September 1998 Summary: Microsoft Windows NT version 4.0 includes a vast array of features and components for Transmission Control Protocol/Internet Protocol

More information

SNMP SNMP. SNMP The SNMP Communication Model. Functional Model. (Functional) -4. Network Mangement. Communication Model.

SNMP SNMP. SNMP The SNMP Communication Model. Functional Model. (Functional) -4. Network Mangement. Communication Model. : SNMP The SNMP Communication Model Functional Model 2 Network Mangement SNMP Organization Model Information Model Communication Model Functional Model Figure 3.1 SNMP Network Management Model SNMP OSI

More information

Advanced Data Communication Networks

Advanced Data Communication Networks Advanced Data Communication Networks Dr. Farhad Faghani Assistant Professor, Department of Electrical Engineering, Najafabad Branch, Islamic Azad University. Session 1: Introduction + The OSI Model and

More information

0 TCP/IP overview. 0.1 The Internet

0 TCP/IP overview. 0.1 The Internet 0521841445 - / Essentials: A Lab-Based Approach 0 / overview From these assumptions comes the fundamental structure of the Internet: a packet switched communications facility in which a number of distinguishable

More information

Teh Interwebs CISC 282. January 9, The Internet/WWW. Set of rules that govern communication The "language" spoken by the computers in a network

Teh Interwebs CISC 282. January 9, The Internet/WWW. Set of rules that govern communication The language spoken by the computers in a network Teh Interwebs CISC 282 January 9, 2014 The Internet/WWW Network Collection of connected computers Communicate and share resources Protocol Set of rules that govern communication The "language" spoken by

More information

CorreLog. SQL Table Monitor Adapter Users Manual

CorreLog. SQL Table Monitor Adapter Users Manual CorreLog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved. No

More information

SNMP. Simple Network Management Protocol. Chris Francois CS 417d Fall 1998

SNMP. Simple Network Management Protocol. Chris Francois CS 417d Fall 1998 SNMP Simple Network Management Protocol Chris Francois CS 417d Fall 1998 cfrancois@acm.org What is Network Management? Basic tasks that fall under this category are: Configuration Management Keeping track

More information

Chapter 2 Networking Standards and the OSI Model

Chapter 2 Networking Standards and the OSI Model Network+ Guide to Networks, 6 th Edition 2-1 Chapter 2 Networking Standards and the OSI Model At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

Introduction to internetworking, OSI, TCP/IP and Addressing.

Introduction to internetworking, OSI, TCP/IP and Addressing. Introduction to internetworking, OSI, TCP/IP and Addressing. Network Devices Repeater (Hub) Hubs don t break collision and broadcast domains. So any packet will be forwarded to all ports. Bridge (Switch)

More information