Internet Management Overview

Size: px
Start display at page:

Download "Internet Management Overview"

Transcription

1 Internet Management Overview Based on the Manager-Agent Model Initially SNMPv1 (1990), SNMPv Managed Objects similar to OSI attributes, specified through ASN.1 Macros the SNMP Structure of Management Information (SMI) SNMP provides the management access service Unreliable, connectionless service Multiple object selection through GET-NEXT, GET- BULK (v2) No Filtering Event capabilities only between management systems (not bound to MOs) Minimal aspect only standardised The Internet Management framework was conceived a a simpler version of OSI Management to meet the needs of private networks (LANs, MANs) and the Internet. It is specified in a series of Internet Requests For Comments (RFCs). The first version appeared in 1990 and achieved wide acceptance because of its simplicity. Its limitations though become soon apparent: version 2 was proposed in 1993 but was only been agreed at the end of It enhances the known problems of SNMPv1 but does not address security issues, as it was initially intended. SNMP is a specialisation of the manager-agent model with the following specific features: Its information model is rudimentary, with managed objects similar to OSI attributes. A set of ASN.1 macros are used to specify formally managed objects. This language is known as the SNMP Structure of Management Information (SMI). The management access mechanism is provided by the Simple Network Management Protocol (SNMP). This operates over the Internet UDP/IP and offers an unreliable connectionless service: management applications should take care of reliability through retransmission. The event model is very limited in SNMPv1: few traps are emitted by managed elements but they are not reliable and their reception cannot be controlled by managers. This is extended in SNMPv2 with reliable inform requests but only in the manager-to-manager domain. Finally, only minimal aspects are standardised i.e. there is no wide range of generic specifications similar to the OSI systems management functions. 1

2 The Information Model Object-based rather than fully objectoriented No inheritance and composite object boundary Object similar to OSI attributes Managed Object Operations Only SET and GET Actions emulated through SET operations Create and delete operations apply only to table entries, hence also emulated through SET operations Notifications are associated with the agent The SNMP information model is rudimentary: objects are similar to OSI attributes or simply variables that may be accessed remotely. There is no composite object boundary grouping many of these objects together in an object instance as in OSI management. In addition, there is no inheritance and associated object-oriented properties. Finally, the SNMP objects may have only integer and string syntaxes. Entities that need to be modelled through more complex syntaxes will have to use many of these simple objects. Naming is based in some notion of containment but in a different sense to OSI management. ASN.1 Object Identifiers are used to name objects as opposed to the OSI Distinguished Names. Given the fact that there is no composite object boundary, the only operations allowed on the simple SNMP objects are Get and Set. Actions may be emulated through Set operations e.g. reboot may be emulated by setting a relevant state object to true. Of course, this is more difficult for arbitrary remote operations with parameters and results e.g. testing operations. This emulation also results in complex and not elegant information models. Creation and deletion are only allowed for table entries or rows. Creation is emulated by a set request with all the objects of a non-existing entry while deletion is emulated by setting a rowstatus object that all tables have to delete. Creation and deletion did not work very well is SNMPv1 but have been fixed in SNMPv2. Finally, notifications are not associated to objects as in OSI management but to the whole of the agent (v2). In SNMPv1 traps were associated with the protocol itself i.e. they were part of the relevant PDU and were not specified formally otherwise. 2

3 SNMP Managed Objects Objects are of simple scalar types (Integer, String) Two-dimensional tables are the only constructed types allows Table entries or rows consist of scalar objects Tables and their entries are conceptual object, only the row cab be accessed via SNMP. The SNMP information model does not use Object-Oriented (O-O) concepts such as classes and inheritance which are though as unnecessary complications; as such, is often referred to as Objectbased. The basic building block of an SNMP MIB is the object. Objects belong to a particular object type and have values. Object values are restricted to a very small set of allowed syntaxes, resulting ultimately to the basic ASN.1 scalar types INTEGER and OCTET STRING. In addition, the only constructed type allowed is a simple two-dimensional table, consisting of elements of the previous primitive types. Thus the SNMP SMI is analogous to a computer language which has a small set of basic types together with two-dimensional arrays. The advantage of using only a small fixed set of syntaxes is that it is possible to hand-code the encoding and decoding software in an optimal fashion. The disadvantage is lack of expressive power. The SNMP notation for specifying new object types is an ASN.1 template called OBJECT-TYPE. ASN.1 is used to specify the object syntaxes and the tabular structure. SNMP object-types can be either single or multiple instanced, with multiple instanced objects only allowed in tables. SNMP objects are similar to OSI Management / OMG CORBA attributes while there is no notion of a composite object-boundary that encapsulates a number of scalar objects modelling a manageable entity. The only composite relationship relates objects to tables. A table has rows (also referred to as entries or records), with each row represented by a SEQUENCE ASN.1 type that contains a statically defined number of objects. The table itself is modelled as SEQUENCE OF ASN.1 type with respect to the rows or entries, allowing an arbitrary number of those to be dynamically instantiated. A table thus resembles to a dynamic array of records. A further rule restricts the syntaxes used within a row to be scalar ; thus one cannot define tables within tables. Note also that tables and table entries are only conceptual composite objects in SNMP: only the individual scalar objects that constitute a table entry are accessible through the management protocol. 3

4 Example SNMP MIB tp group object ordering tpconn table entries SNMP transport protocol object SNMP transport connection tabular object Let us examine the use of this modelling framework in two examples. A typical single-instanced set of objects are, for example, those modelling aspects of a connection-oriented transport protocol entity such as OSI Transport Protocol (TP), Internet Transmission Control Protocol (TCP), etc. Such objects will cover the number of current and previous connections, the number of incoming and outgoing unsuccessful connection requests, the number of transport packets sent, received and retransmitted and the number of various protocol-related errors. All these will have to be separate objects, loosely related through a transport protocol group. The group will also comprise transport connections, which are multiple-instanced objects and have to be modelled through a table. A tpconntable may be defined as a SEQUENCE OF tpconnentry, with tpconnentry being a SEQUENCE of objects modelling various aspects of the connection, such as source and destination access points, the connection state, etc. The figure above shows objects of a single-instanced group, e.g. tp, and two table entries, e.g. tpconnentry. Note that both the group and table entries are depicted with dotted lines as there is no notion of a composite object boundary the SNMP information model. Another example could be a table representing users of a computer system and their disc quota. A discquotatable may be defined as a SEQUENCE OF discquotaentry. The latter could be a SEQUENCE of objects modelling the user number and name and the corresponding used and maximum disc quota for that user. 4

5 SNMP Managed Object Naming OIDs are used for naming For single-instaced objects the type OID is suffixed by 0 E.g. tpcurrentconnection.0 For multiple-instanced tabular objects the type OID is suffixed by the unique object Key value e.g. discquotamaxquota.1234 Naming thus exhibits tight binding between type and instance identifiers Cannot reuse a type in multiple contexts, i.e. in different MIBs When objects are instantiated they must be named so they can be addressed unambiguously. The SNMP framework uses object identifiers for naming. Every object type has a registration OID while an object instance is identified by the object type OID, suffixed by a part that identifies uniquely that instance. For non-tabular objects any suffix would do, so the minimal.0 is used. For example, tpcurrentconnections.0 is the instance of the object type tpcurrentconnections. In the case of multiple-instanced tabular objects such as the discquotamaxquota, the suffix needs to signify the table entry. The latter can be constructed from the values of one or more objects of that entry that constitute the key ; as specified in the relevant OBJECT-TYPE template for that table entry. In our example, the value of the discquotausernumber object may be used. As such, discquotamaxquota.1234 is the instance of the object type discquotamaxquota, corresponding to the user whose number is Note that in the case that object values are strings as opposed to integers, they need to be converted to object identifier suffixes: this is done by converting each character to the corresponding ASCII numeric value. The SNMP naming architecture exhibits a very tight binding between object type and instance identifiers and this is both a strength and a weakness. On the plus side, the scheme is easy to understand and only one hierarchical naming scheme needs to be understood. On the minus side it means that instances of a particular object type can only appear in one particular place in the registration tree. This means that one cannot define generic object types to be used in several contexts. For example, a common object for representing the state as perceived by a managed resource is the operationalstate. In the SNMP framework, it is not possible to define such generic objects but specific objects have to be defined for every particular context e.g. tpentityoperationalstate, etc. An additional minus is that object names formed through OID suffixes are arguably not natural. 5

6 The Management Protocol SNMP Simple Network Management Protocol Connectionless, unreliable communications over UDP/IP Management operations GET, GET-NEXT, SET, TRAP (v1) GET-BULK, INFORM (added in v2) Maximum PDU size limited to ~500 bytes The Simple Network Management Protocol provides communication capabilities between applications in manager and agent roles. It provides a connectionless, unreliable service and operated over the Internet User Datagram Protocol (UDP) and the Internet Protocol (IP). The overall protocol stack is SNMP over UDP (transport layer) over IP (network layer). The SNMP operations are a superset of those provided by the managed objects. SNMPv1 offers the Get, Get-Next (traversal), Set and Trap primitives. Traps are emitted by agents in network elements but are not retransmitted by them, so their reception is unreliable. SNMPv2 has added Get-Bulk and Inform primitives; Inform can be thought as a reliable trap but applies only in the manager-tomanager domain (not allowed in network elements). Get, Set, Get-Next and Get-Bulk may need to be retransmitted by applications in manager roles to cope with packet loss. Note that either the request or reply packet may be lost, which means that intrusive operations (Set) need to be idempotent: the same operation should not have any side-effects if it is performed accidentally more than once. Get-Next and Get-Bulk provide traversal and bulk retrieval facilities. In fact, Get-Bulk is an enhanced Get-Next where more than one next objects may be requested. All the objects in a SNMP agent are ordered: there is a first and a last object and the next object may be requested; this is how Get-Next and Get-Bulk work. There is always only one reply packet to SNMP requests i.e. there is no facility such as linked replies in OSI management. The bulk data retrieval capabilities are restricted by the fact that the maximum allowed packet size is around 500 bytes. This is because larger packets will most probably be fragmented by the network layer and this increases the probability that a fragment may be lost. In fact, management applications are expected to provide functionality similar to those of reliable transport protocols. 6

7 The SNMP Protocol Stack A SNMP T N I/F UDP IP Note Note: The Internet interface layer is deliberately left undefined In the Internet management framework, the fundamental axiom has been simplicity at the agent part of the manager-agent spectrum. This important design decision aimed at the provision of standard management interfaces to the majority of network devices at a minimal cost and has influenced the associated access paradigm. SNMP has been designed to support a connectionless style of management communication and, as such, it has been mapped over the User Datagram Protocol (UDP) and the Internet Protocol (IP) as shown above. The relevant thinking is that reliable transport protocols such as the Transport Control Protocol (TCP) impose too much memory and processing overhead to be supported by simple network devices such as routers, bridges, etc. In addition, maintaining transport connections requires state information, which again is considered to be expensive and, as such, undesirable. Also, bearing in mind SNMP projects a largely centralised model, it is impossible to maintain simultaneously thousands of connections from a Management Operations Centre (MOC) to the managed devices. Applications using the SNMP protocol will need to ensure the reliability of underlying communication by undertaking retransmission. In other words, applications should try to emulate the functionality of a reliable transport protocol by setting timers every time they perform a transaction and possibly retransmit. An important related aspect is that only applications in manager roles do retransmit, agents simply respond to requests. As such, there is the possibility that either the request or the response packet is lost. If the response packet is lost, the management operation will be eventually performed more than once; this is fine for information retrievals but could cause problems for intrusive operations. As such, either the latter should be idempotent or measures should be taken in the agent to prevent an operation from being performed twice (test-and-set, etc.). Finally, agents in managed devices do not even retransmit notifications (or traps), it is only applications in dual manager-agent roles that are allowed to retransmit manager-level notifications in SNMPv2 (or inform-requests). 7

8 SNMP Protocol Operations MANAGER NETWORK AGENT Get, Set Get-next, Get-bulk Response Trap time Inform Response Note 1: Inform is only allowed for dual agent-manager entities Note 2: Get-bulk and Inform have been added in SNMPv2 The management protocol operations are a superset of the operations available at the object boundary inside agents. SNMP objects accept only Get and Set operations while imperative commands (actions) and table entry creation and deletion are emulated through Set. As such, the SNMP protocol has also Get and Set request packets. Also, agents emit notifications, which are sent to manager applications through the Trap SNMP packet. In addition to those operations, it is necessary for manager applications to be able to discover transient objects, for example table entries for which it is impossible to know their names in advance, e.g. connections, routes, etc. The SNMP naming architecture relies on ASN.1 object identifiers and since the latter have ordering qualities, a collection of SNMP objects visible across an interface is ordered in a linear fashion, with a first and last object. It is exactly this linear structure that is exploited through the Get-next operation which allows to retrieve the next object of any other object in the MIB. This is typically used for traversing tables and allows the retrieval of one table entry at a time if the entry names are not known in advance. In SNMPv2, two more primitives have been added. The inform-request packet is to be used between hybrid manager-agent applications in order to report asynchronous notifications to each other; its receipt should be acknowledged by the receiving application. This means that it should be retransmitted, so it can be thought as a reliable trap. Note though that managed devices are not supposed to use this facility. The second addition has been the Get-bulk primitive; which is an extension of Get-next as it allows to retrieve more than one next objects. Though it is better than Get-next, it is still a poor bulk data retrieval facility because SNMP does not allow multiple replies but the result should fit in one response packet. Given the fact the underlying transport is unreliable, the maximum allowed application-level packet size is about 500 bytes in order to avoid networklevel segmentation. In short, the SNMP mode of operation is request-reply or request only for traps. The possible interactions using SNMP operations are shown above. 8

9 SNMP Event-based Operation SNMPv1 Traps are send from managed agent to predefined manager applications Not configurable at runtime No reliable transmission of event Hence polling model still dominant, which raises scaling problems SNMPv2, reliable event possible between hybrid manager-agents Configurable No OSI style filtering Event-based operation in SNMP is pretty simple-minded. Traps are sent asynchronously from managed devices to predefined managers and are not retransmitted. This means they are inherently unreliable and, as such, managers should not rely on them but should also monitor managed devices through periodic polling. This approach does not scale as it imposes management traffic on the managed network even when nothing happens. It also requires careful trade-off between the polling frequency and the potential elapsed time after a significant change before a manager knows about it. In SNMPv2, the event model between hybrid manager-agent applications is more flexible as it allows to request particular events by creating entries in a relevant table. These events are retransmitted until an acknowledgement is received. On the other hand, it is not possible to specify any other event-associated conditions through filtering, in order to minimise further management traffic. 9

10 SNMP Distribution Aspects Location Transparency not an issue Agents are addressed through their IP address at UDP port 161 Managers listen for events at UDP port 162 Agents discovered using multicast on LAN/MANs Mainly suited to centralise management model Distribution in terms of location transparency is not an issue in SNMP. Manager applications address agents in managed devices through their IP address while the agent is always attached to the UDP port number 161. This simplistic model allows for the discovery of device agents in LANs and MANs because of their broadcast nature: a multicast SNMP message is sent to all the nodes of the LAN at the known port number, requesting the first MIB object e.g. Get-next(name=0.0) and the nodes that respond have been discovered. On the other hand, such discovery is not possible for higher-level hybrid manager-agent applications as it is not specified on which port they should be attached. The only aspect that is specified regarding manager applications is they should be listening on UDP port 162 for traps and confirmed inform-requests. In summary, the SNMP distribution model is very simple, in a similar fashion to the whole framework. It serves well enough the centralised model for managing LANs and MANs but has obvious limitations in more complex environments. 10

11 Comparison of OSI and Internet Management Similar in: manager-agent model separation of information structure, MIBs and protocols Differ in: object oriented vs. object based MO definition separation of naming and registration tree scoping and filtering event granularity and control connection-oriented vs. connectionless OSI and Internet Management are similar in their use of the management-agent model and the abstraction of resources through managed objects. They are also similar in the way their respective standards have been structured with a separation between the definition of how management information is structured, the definition of specific management information and definition of the protocol used to communicate management information. For OSI Management these are GDMO, SMFs and specific MIBs and CMIP respectively, while in Internet Management these correspond to SMI, the MIB and SNMP. The two approaches differ in the following: MO definition is object oriented in OSI Management, enabling the MO definer to exploit object inheritance and making allomorphism (the distributed version of polymorphism) possible. In Internet Management MOs are simple type or table entries and cannot exploit object-oriented features. In Internet Management the naming, and therefore containment of MOs is defined in the MIB definition by its ANS.1 registration name. In OSI Management MO naming/containment is separate from MO definition, so the MO can appear in different places in the containment tree. OSI Management offers the ability to scope a request over a range of levels in an MO containment tree and to select MO to which a request is applied by defining composite logical expressions. Internet Management does not support this. OSI Management allows events to be defined for individual MOs and provides run time control of the conditions under which an event is emitted and to which manager. Internet Management only support agent level events. OSI management used connection-oriented communications, while Internet Management uses connectionless, so operations and events may be lost in transit. 11

Management Standards

Management Standards Communications Management Standards David Lewis Elements of Open Communications Management Structure of Management Information + Formal MIB Specifications + Management Protocol + Common underlying protocol

More information

Simple Network Management Protocol

Simple Network Management Protocol 56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

THE TRANSPORT LAYER UNIT IV

THE TRANSPORT LAYER UNIT IV THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Network management takes place between two major types of systems: those in control, called managing systems, and those observed and controlled, called managed systems. The most common managing

More information

Lecture 18: Network Management

Lecture 18: Network Management Lecture 18: Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 18-1 Objective Manage a network by managing its components: routers, bridges,

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

SNMP Simple Network Management Protocol

SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:

More information

SNMP and Network Management

SNMP and Network Management Contents SNMP and Network Management Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions Nixu Ltd 2 Network management When you have 100s of computers in a network or are

More information

Unit 2. Internet based Network Management

Unit 2. Internet based Network Management Unit 2 Internet based Network Management Internet based Network Management In the Internet world Network management refers to management of networks, devices, and hosts Achieved through 'Simple Network

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and a

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

SNMP and Network Management

SNMP and Network Management SNMP and Network Management Nixu Ltd Contents Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions 2 Network management When you have 100s of computers in a network or are

More information

Using Distributed Object Technologies for Network Management

Using Distributed Object Technologies for Network Management Using Distributed Object Technologies for Network Management George Pavlou Centre for Communication Systems Research University of Surrey, UK http://www.ee.surrey.ac.uk/ccsr/networks/ 1 Overview After

More information

SNMP: Simplified. White Paper by F5

SNMP: Simplified. White Paper by F5 The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white

More information

Structure of Management Information

Structure of Management Information Structure of Management Information Structure of Management Information' (SMI) defines the general framework within which MIBs can be defined and constructed (STD58) SMI identifies data types usable in

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Network Management The network management is to Monitor the network Ensure the operations over the network are functional Assure the network works efficiently An

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

SNMP SIMULATOR. Description

SNMP SIMULATOR. Description SNMP SIMULATOR Overview The SNMP Agent Simulator enables simulation of standalone SNMP agents to test and demonstrate SNMP-based management applications. Its unique ability to create default values from

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

MODELS OF DISTRIBUTED SYSTEMS

MODELS OF DISTRIBUTED SYSTEMS Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between

More information

Carlos Samitier Joaquin Luque Fernando Gonzalo DIMAT S.A. Manuel Mejías Grupo Endesa Spain Universidad de Sevilla (Spain) Spain

Carlos Samitier Joaquin Luque Fernando Gonzalo DIMAT S.A. Manuel Mejías Grupo Endesa Spain Universidad de Sevilla (Spain) Spain Carlos Samitier Joaquin Luque Fernando Gonzalo DIMAT S.A. Manuel Mejías Grupo Endesa Spain Universidad de Sevilla (Spain) Spain NETWORK MANAGEMENT ARCHITECTURE FOR POWER UTILITY NETWORKS ABSTRACT Telecommunication

More information

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2014-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

NET311 Computer Networks Management Standards, Models and Language

NET311 Computer Networks Management Standards, Models and Language NET311 Computer Networks Management Standards, Models and Language Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

JacobsSNMP. Siarhei Kuryla. May 10, Networks and Distributed Systems seminar

JacobsSNMP. Siarhei Kuryla. May 10, Networks and Distributed Systems seminar JacobsSNMP Siarhei Kuryla Networks and Distributed Systems seminar May 10, 2010 Simple Network Management Protocol protocol for exchange of management information; exposes management data in the form of

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Outline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol

Outline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol Outline SNMP Simple Network Management Protocol Several slides are courtesy of the Addison Wesley companion web site for textbook by Liebeherr and El Zarki and others added by M. Veeraraghavan, Univ. of

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

Unit 2.

Unit 2. Unit 2 Unit 2 Topics Covered: 1. PROCESS-TO-PROCESS DELIVERY 1. Client-Server 2. Addressing 2. IANA Ranges 3. Socket Addresses 4. Multiplexing and Demultiplexing 5. Connectionless Versus Connection-Oriented

More information

From Protocol-based to Distributed Object-based Management Architectures

From Protocol-based to Distributed Object-based Management Architectures From Protocol-based to Distributed Object-based Management Architectures George Pavlou Dept. of Computer Science, University College London Gower Street, London WC1E 6BT, UK Abstract:

More information

Switched Multimegabit Data Service (SMDS)

Switched Multimegabit Data Service (SMDS) CHAPTER 14 Switched Multimegabit Data Service (SMDS) Background Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication

More information

Brief Introduction to the Internet Standard Management Framework

Brief Introduction to the Internet Standard Management Framework Part 2: Structure of Management Information Version 2 (SMIv2) The SMI is the Data Definition Language, based loosely on an old version of ASN.1 and used to model and define management information to be

More information

QWEST Communications International Inc. Technical Publication

QWEST Communications International Inc. Technical Publication QWEST Communications International Inc. Technical Publication Customer Network Management for QWEST Frame Relay Service and QWEST Switched Multimegabit Data Service Copyright 1994, 1996, 2001 77376 QWEST

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

Lecture 11: Introduction to Network Management

Lecture 11: Introduction to Network Management Lecture 11: Introduction to Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 11-1 Objective Manage a network by managing its components: routers,

More information

Network Management System

Network Management System Network Management System NMS: Simple solution: Ping all elements routinely If machine down go and fix it Time stamps on ping packets indicate delay, congestion Becomes a problem with large and complex

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2017-05-22 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference

For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference CHAPTER 51 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 4500 series switch. Note For complete syntax and usage information for the commands used

More information

CS Efficient Network Management. Class 4. Danny Raz

CS Efficient Network Management. Class 4. Danny Raz CS236635 Efficient Network Management Class 4 Danny Raz 1 Minhalot Midterm: 12/12 in class Will be Moed B 9/1/06 during tirgul time Exercise1 is due NEXT WEEK No tirgulim until 12/12/05 2 Objectives MIB

More information

SNMP and Network Management

SNMP and Network Management SNMP and Management Simple Management Protocol A Standard Protocol for Management SNMP how it was born In 1980 s, networks grew, hard to manage Many vendors, many protocols Many saw a need for standard

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

MODELS OF DISTRIBUTED SYSTEMS

MODELS OF DISTRIBUTED SYSTEMS Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between

More information

Introduction to Systems and Network Management

Introduction to Systems and Network Management Introduction to Systems and Network Management Shang Juh Kao Dept. of Computer Science and Engineering National Chung Hsing University Tel: 04-2284-0497 x 708 Email: sjkao@cs.nchu.edu.tw 1 This course

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 24 CHAPTER This chapter describes how to configure the the ML1000-2, ML100T-12, ML100X-8, and ML-MR-10 cards for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage

More information

Switched Multimegabit Data Service

Switched Multimegabit Data Service CHAPTER 14 Chapter Goals Tell how SMDS works, and describe its components. Describe the operational elements of the SMDS environment, and outline its underlying protocol. Discuss related technologies.

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Configuring AppleTalk

Configuring AppleTalk Configuring AppleTalk This chapter describes how to configure AppleTalk and provides configuration examples. For a complete description of the AppleTalk commands mentioned in this chapter, refer to the

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER Configuring SNMP This chapter describes how to configure the ML-Series card for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage information for the

More information

Applications FTP. FTP offers many facilities :

Applications FTP. FTP offers many facilities : Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2014 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #1 Starts in one week Is your Linux environment all ready? Bring your laptop Work time after quick

More information

Experimental Extensions to RSVP Remote Client and One-Pass Signalling

Experimental Extensions to RSVP Remote Client and One-Pass Signalling 1 Experimental Extensions to RSVP Remote Client and One-Pass Signalling Industrial Process and System Communications, Darmstadt University of Technology Merckstr. 25 D-64283 Darmstadt Germany Martin.Karsten@KOM.tu-darmstadt.de

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

AppleTalk. Chapter Goals. Introduction CHAPTER

AppleTalk. Chapter Goals. Introduction CHAPTER 35 CHAPTER Chapter Goals Describe the development history of the protocol, used almost exclusively in Macintosh computers. Describe the components of networks and extended network. Discuss the primary

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

DISTRIBUTED COMPUTER SYSTEMS

DISTRIBUTED COMPUTER SYSTEMS DISTRIBUTED COMPUTER SYSTEMS Communication Fundamental REMOTE PROCEDURE CALL Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline Communication Architecture Fundamentals

More information

Network Management. Raj Jain Raj Jain. Washington University in St. Louis

Network Management. Raj Jain Raj Jain. Washington University in St. Louis Network Management Raj Jain Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-09/

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

Network control and management

Network control and management Network control and management Network management What is network management?? Why is it needed? Mani Subramanian, Network Management: An introduction to principles and practice, Addison Wesley Longman,

More information

Binding information contains the entries in the mobility binding table.

Binding information contains the entries in the mobility binding table. GLOSSARY Numerics 802.11b/g An IEEE specification for a wireless LAN airlink. A agent advertisement agent discovery agent solicitation An advertisement message constructed by attachment of a special extension

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Outline Network Management MIB naming tree, MIB-II SNMP protocol Network management in practice. Network Management. Jaakko Kotimäki.

Outline Network Management MIB naming tree, MIB-II SNMP protocol Network management in practice. Network Management. Jaakko Kotimäki. Outline MIB naming tree, MIB-II SNMP protocol Network management in practice 19.10.2010 Outline MIB naming tree, MIB-II SNMP protocol Network management in practice Outline Contents MIB naming tree, MIB-II

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Network Working Group Request for Comments: 2320 Category: Standards Track Bay Networks, Inc. K. White IBM Corp. T. Kuo Bay Networks, Inc.

Network Working Group Request for Comments: 2320 Category: Standards Track Bay Networks, Inc. K. White IBM Corp. T. Kuo Bay Networks, Inc. Network Working Group Request for Comments: 2320 Category: Standards Track M. Greene Xedia Corp. J. Luciani Bay Networks, Inc. K. White IBM Corp. T. Kuo Bay Networks, Inc. April 1998 Status of this Memo

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER CHAPTER 28 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 2960 switch. For complete syntax and usage information for the commands used in this chapter,

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

EE122 - Midterm 1 Examination EECS-UC Berkeley October 2000

EE122 - Midterm 1 Examination EECS-UC Berkeley October 2000 EE122 - Midterm 1 Examination EECS-UC Berkeley October 2000 B This is a closed book exam. The paper consists of 7 pages including the cover page. THe total poin obtinable for the paper is 100. Students

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Internet and Web Technologies. Sample Solutions 2013

Internet and Web Technologies. Sample Solutions 2013 Internet and Web Technologies Sample Solutions 2013 1. (a) stream paradigm connection-oriented one-to-one communication sequence of individual bytes arbitrary length transfer used by most applications

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science and Technology. 16.

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science and Technology. 16. Jaakko Kotimäki Department of Computer Science Aalto University, School of Science and Technology Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in

More information

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics Simple Network Management Protocol Support, page 1 SNMP Basics, page 1 SNMP Management Information Base (MIB), page 2 Set Up SNMP, page 3 Import Previously Configured Windows SNMP v1 Community Strings,

More information

Jaringan Komputer. The Transport Layer

Jaringan Komputer. The Transport Layer Jaringan Komputer Transport Layer The Transport Layer The heart of the whole protocol hierarchy Task: To provide reliable, cost-effective data transport from the source machine to the destination machine,

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324 Transport Layer TCP & UDP Week 7 Module : Computer Networks Lecturers : Lucy White lbwhite@wit.ie Office : 324 1 Purpose of the Transport Layer The Transport layer provides for the segmentation of data

More information

Distributed Systems Theory 4. Remote Procedure Call. October 17, 2008

Distributed Systems Theory 4. Remote Procedure Call. October 17, 2008 Distributed Systems Theory 4. Remote Procedure Call October 17, 2008 Client-server model vs. RPC Client-server: building everything around I/O all communication built in send/receive distributed computing

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

, Network Management, Future

, Network Management, Future Tik-110.350 Computer Networks (3 cr) Spring 2000 E-mail, Network Management, Future Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi Tik-110.350 Computer Networks, 19.4.2000,

More information

UDP: Datagram Transport Service

UDP: Datagram Transport Service UDP: Datagram Transport Service 1 Topics Covered Introduction Transport Protocols and End-to-End Communication The User Datagram Protocol The Connectionless Paradigm Message-Oriented Interface UDP Communication

More information