Chapter 9 Network Management
|
|
- Fay McGee
- 5 years ago
- Views:
Transcription
1 Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we d like people to use our book!) If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July Network Management 9-1
2 Chapter 9: Network Management Chapter goals: introduction to network management motivation major components Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for network management security and administration presentation services: ASN.1 Network Management 9-2
3 Chapter 9: Network Management Chapter goals: introduction to network management motivation major components Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for network management security and administration presentation services: ASN.1 Network Management 9-3
4 Motivation Detecting failure of an interface card at a host or a router Host monitoring Monitoring traffic to aid in resource deployment Network Management 9-4
5 Motivation Detecting rapid changes in routing tables Route flapping due to instability in routing or misconfigured router Monitoring for SLAs Increased interest in traffic monitoring to check for compliance with SLAs Check for service availability (outage), latency, throughput, and outage notification Intrusion detection Notified of traffic from/to suspicious sources Detect certain type of traffic typical of security attack Network Management 9-5
6 Chapter 9: Network Management Chapter goals: introduction to network management motivation major components Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for network management security and administration presentation services: ASN.1 Network Management 9-6
7 Areas of Network Management 1. Performance Management To quantify, measure, report, analyze, and control performance (utilization and throughput) 2. Fault Management To log, detect, and respond to fault conditions in the network 3. Configuration Management To allow a network manager track which devices are on the managed network and the hardware and software configuration of these devices 4. Accounting Management Allows the network manager to specify, log, and control user and device access to network resources 5. Security Management To control access to network resources according to some well-defined policy Network Management 9-7
8 Scope of Study Will cover The infrastructure of network management The overall architecture Network management protocols Information base Will not cover: Decision-making processes of network administrators Fault identification and management Proactive anomaly detection Alarm correlation Service management Provisioning of resources, such as: bandwidth, server capability and other computational/communication resources Network Management 9-8
9 Chapter 9 outline What is network management? Internet-standard management framework Structure of Management Information: SMI Management Information Base: MIB SNMP Protocol Operations and Transport Mappings Security and Administration ASN.1 Network Management 9-9
10 What is network management? autonomous systems (aka network ): 100s or 1000s of interacting hardware/software components other complex systems requiring monitoring, control: jet airplane nuclear power plant others? "Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost." Network Management 9-10
11 Infrastructure for Network Management The hardware and software components to give the network administrator to "Network monitor, management test, poll, configure, includes the.. deployment,. and integration control and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the realtime, operational performance, and Quality of Service requirements at a reasonable cost." Network Management 9-11
12 Infrastructure for network management definitions: managing entity managing entity data network management protocol agent agent data managed device data managed device managed devices contain managed objects whose data is gathered into a Management Information Base (MIB) agent data managed device agent data managed device Network Management 9-12
13 Infrastructure for network management definitions: managing entity managing entity data network management protocol agent agent data managed device data managed device managed devices contain managed objects whose data is gathered into a Management Information Base (MIB) agent data managed device agent data managed device Network Management 9-13
14 1. Managing Entity An application running in a centralized network management station in the NOC. It is the locus of activity for network management information At managing Entity: actions are initiated to control network behavior, and the human network administrator interacts with network devices Network Management 9-14
15 2. Managed Devices Network equipment (including software) that resides on a managed network Might be a host, router, bridge, hub, printer, or modem Within a managed device, there are: several managed objects Network management agent Network Management 9-15
16 Managed Objects Managed objects are: Actual pieces of hardware within the managed device (e.g. NIC) The sets of configuration parameters for the pieces of hardware and software (e.g. an intradomain routing protocol such as RIP) Information associated with Managed objects are collected into a Management Information Base (MIB) Network Management 9-16
17 Network Management Agent A process running in the manged device Communicates with the managing entity Taking local actions at the managed device Under the command and control of the managing entity Network Management 9-17
18 3. Network Management Protocol Runs between the managing entity and the managed devices Allows the managing entity to query the status of managed devices Allows agents to report exceptional events to managing entity (e.g. component failure or violation of performance thresholds) Indirectly take actions at these devices via its agents Network Management 9-18
19 3. Network Management Protocol Does not manage the network Provide a tool with which the network administrator can manage Network Management 9-19
20 Network Management standards OSI CMISE/CMIP o Common Management Information Services Element/Common Management Information Protocol designed 1980 s: the unifying net management standard too slowly standardized SNMP: Simple Network Management Protocol Internet roots (SGMP) started simple Independent of vendorspecific products deployed, adopted rapidly growth: size, complexity currently: SNMP V3 de facto network management standard Network Management 9-20
21 Chapter 9 outline What is network management? Internet-standard management framework Structure of Management Information: SMI Management Information Base: MIB SNMP Protocol Operations and Transport Mappings Security and Administration ASN.1 Network Management 9-21
22 Framework for Network Management Should address the following questions: What is being monitored? And what form of control can be exercised by the network administrator? What is the specific form of the information that will be reported and/or exchanged? What is the communication protocol for exchanging this information? Network Management 9-22
23 SNMP overview: 4 key parts Definitions of Network Management Objects Management information base (MIB) Data Definition Language Structure of Management Information (SMI): SNMP protocol convey manager<->managed object info, commands Security, administration capabilities major addition in SNMPv3 Network Management 9-23
24 SNMP overview: 4 key parts Management information base (MIB): distributed information store of network management data Structure of Management Information (SMI): data definition language for MIB objects defines data types, object model, and rules for writing and revising management information SNMP protocol convey manager<->managed object info, commands security, administration capabilities major addition in SNMPv3 Network Management 9-24
25 SNMP overview: 4 key parts Management information base (MIB): distributed information store of network management data Structure of Management Information (SMI): data definition language for MIB objects SNMP protocol convey manager<->managed object info, commands security, administration capabilities major addition in SNMPv3 Network Management 9-25
26 Network Management Objects Also known as Management Information Base (MIB) objects Management information is represented as a collection of managed objects that together form a virtual information store, known as the MIB Network Management 9-26
27 Network Management Objects An MIB object may be: A counter: such as the number of IP datagrams discarded at a router due to errors in an IP datagram header, or Carrier sense errors in an Ethernet interface card Descriptive information: such as the version of the software running on a DNS server Status information: such as whether a particular device is functioning correctly; or Protocol-specific information: such as a routing path to a destination. Network Management 9-27
28 MIB Objects MIB Objects define the management information maintained by a managed device Related MIB objects are gathered into MIB modules Network Management 9-28
29 SNMP overview: 4 key parts Management information base (MIB): distributed information store of network management data Structure of Management Information (SMI): data definition language for MIB objects SNMP protocol convey manager<->managed object info, commands security, administration capabilities major addition in SNMPv3 Network Management 9-29
30 SMI What: language to define the management information residing in a managed-network entity Purpose: syntax, semantics of management data welldefined, unambiguous SMI hierarchy Base data types in the SMI How managed objects are described in SMI How related managed objects are grouped into modules Network Management 9-30
31 SMI Base Data Types SMI is based on ASN.1 object-definition language Many SMI-specific data types were added to justify consider it a data definition language RFC 2578 defines 11 basic data types: INTEGER, Integer32, Unsigned32, OCTET STRING, OBJECT IDENTIFIER, IPaddress, Counter32, Counter64, Guage32, Time Ticks, Opaque Also possible to impose a tabular structure on an ordered collection of MIB objects using the SEQUENCE OF construct Network Management 9-31
32 SMI: data definition language Purpose: syntax, semantics of management data welldefined, unambiguous base data types: straightforward, boring OBJECT-TYPE data type, status, semantics of managed object MODULE-IDENTITY groups related objects into MIB module Basic Data Types INTEGER Integer32 Unsigned32 OCTET STRING OBJECT IDENTIFIER IPaddress Counter32 Counter64 Guage32 Time Ticks Opaque Network Management 9-32
33 SMI Higher-Level Construct OBJECT-TYPE Construct: Used to specify the data type, status, and semantics of a managed object Collectively, these managed objects contain the management data that lie at the heart of network management Has four clauses: SYNTAX: Basic data types associated with object MAX-ACCESS: be read, be written, or be created STATUS: current, obsolete, or deprecated DESCRIPTION: textual definition of the object Network Management 9-33
34 OBJECT-TYPE: ipindelivers ipindelivers OBJECT TYPE SYNTAX Counter32 keeps track of the number of IP datagrams that were received at the MAX-ACCESS read-only managed deviceand were successfully STATUS current delivered to an upper layer protocol DESCRIPTION The total number of input datagrams successfully delivered to IP userprotocols (including ICMP) ::= { ip 9} ipindelivers defines a 32-bit counter that Network Management 9-34
35 SMI Higher-Level Construct MODULE-IDENTITY Construct: Allows related objects to be grouped together within a module Contains clauses to document contact information of the author of the module, date of last update, a revision history, and a textual description of the module Network Management 9-35
36 ipmib MODULE-IDENTITY: Module definition for management of the IP protocol ipmib MODULE-IDENTITY LAST-UPDATED Z ORGANZATION IETF SNPv2 Working Group CONTACT-INFO Keith McCloghrie DESCRIPTION The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes. REVISION Z DESCRIPTION The initial revision of this MIB module was part of MIB-II. ::= {mib-2 48} Network Management 9-36
37 SMI Higher-Level Construct NOTIFICATION-TYPE Construct: Used to specify information regarding SNMPv2-Trap and InformationRequest messages generated by an agent or a managing entity Contains a textual DESCRIPTION of when such messages are to be sent, and a list of values to be included in the message generated. Network Management 9-37
38 SNMP MIB MIB module specified via SMI MODULE-IDENTITY (100 standardized MIBs, more vendor-specific) MODULE OBJECT TYPE: OBJECT TYPE: OBJECT TYPE: objects specified via SMI OBJECT-TYPE construct Network Management 9-38
39 SMI: Object, module examples OBJECT-TYPE: ipindelivers ipindelivers OBJECT TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION The total number of input datagrams successfully delivered to IP userprotocols (including ICMP) ::= { ip 9} MODULE-IDENTITY: ipmib ipmib MODULE-IDENTITY LAST-UPDATED Z ORGANZATION IETF SNPv2 Working Group CONTACT-INFO Keith McCloghrie DESCRIPTION The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes. REVISION Z ::= {mib-2 48} Network Management 9-39
40 Management Information Base (MIB) A virtual information store, holding managed objects whose values collectively reflect the current state of the network Managing entity may query and/or set these values by sending SNMP messages to the agent that is executing in a managed device Managed objects are: specified using the OBJECT-TYPE SMI construct, gathered into MIB modules using the MODULE- IDENTITY construct Network Management 9-40
41 MIB Modules Standardization Efforts by IETF Standard modules associated with routers, hosts, and other network equipment Standardization includes: Basic identification data Management information about the device s network interfaces and protocols Network Management 9-41
42 MIB Modules Standardization >100 standards-based MIB modules 100s of vendor-specific MIB modules IETF adopted a standardized object identification (naming) framework Adopted by the ISO as a part of ASN.1 Objects (data format, protocol, or piece of information) were standardized regardless of the Network standards organization (IETF, ISO, IEEE, or ANSI) Equipment manufacturer, or Network owner Network Management 9-42
43 ASN.1 Object Identifier Tree Objects are named in a hierarchal manner Each branch point in the tree has a name and a number Any point is identifiable by the pathsequence (names or numbers) from the root to that point Network Management 9-43
44 OSI Object Identifier Tree USA RSA Microsoft Microsoft Word Definitions of standardized MIB modules (RFC3600) >4000 companies registered with the Internet Assigned Numbers Authority (IANA) Check out Network Management 9-44
45 Standardized MIB Modules RFC 3600 lists standardized MIB modules Managed objects falling under system contain general information about the device being managed All managed devices must support the system MIB objects Next slide defines the managed objects in the MIB module for the UDP protocol at the managed entity Network Management 9-45
46 MIB example: UDP module Object ID Name Type Comments UDPInDatagrams Counter32 total # datagrams delivered at this node UDPNoPorts Counter32 # underliverable datagrams no app at portl UDInErrors Counter32 # undeliverable datagrams all other reasons UDPOutDatagrams Counter32 # datagrams sent udptable SEQUENCE one entry for each port in use by app, gives port # and IP address Network Management 9-46
47 SNMP Naming question: how to name every possible standard object (protocol, data, more..) in every possible network standard?? answer: ISO Object Identifier tree: hierarchical naming of all objects each branchpoint has name, number ISO ISO-ident. Org. US DoD Internet udpindatagrams UDP MIB2 management Network Management 9-47
48 SNMP Protocol Operations SNMPv2 is used to convey MIB information among managing entities and agents Most common usage of SNMP is in a request-response An mode unsolicited message to notify a managing entity of an exceptional An SNMPv2 managing entity sends a request to an SNMPv2 agent, situation who that performs has resulted some in actions changes to MIB object values and sends a reply to the request. Typically, a request will be used to: query (retrieve) or modify (set) MIB object values associated with a managed device Send a trap message to a managing entity Network Management 9-48
49 SNMP protocol Two ways to convey MIB info, commands: request managing entity response agent data managing entity trap msg agent data Managed device request/response mode Managed device trap mode Network Management 9-49
50 SNMPv2 Messages SNMPv2 defines 7 types of PDUs 1. GetRequest 2. GetNextRequest 3. GetBulkRequest 4. InformRequest 5. SetRequest 6. Response 7. SNMPv2-Trap Network Management 9-50
51 SNMP protocol: message types Message type GetRequest GetNextRequest GetBulkRequest InformRequest SetRequest Response Trap Function Mgr-to-agent: get me data (instance,next in list, block) Mgr-to-Mgr: here s MIB value Mgr-to-agent: set MIB value Agent-to-mgr: value, response to Request Agent-to-mgr: inform manager of exceptional event Network Management 9-51
52 SNMP protocol: message types Requests an arbitrary Used to set sequence of Message typeallows through MIB Function values a large list or table block of MIB of data objects GetRequest to be Mgr-to-agent: returned get me data GetNextRequest (instance,next in list, block) GetBulkRequest InformRequest Sent from a managing entity Mgr-to-Mgr: an agent here s MIB value Requests the value of one or more MIB objects MIBs SetRequest object-identifiers Mgr-to-agent: are specified in set the PDU MIB (variable value binding) Agent Response responds with a Agent-to-mgr: Response PDU, value, containing response the to object identifiers and their Request associated values The three message types differ in the granularity of the request Trap Agent-to-mgr: inform manager of exceptional event Network Management 9-52
53 SNMP protocol: message types Message type Function GetRequest Used by the managing Mgr-to-agent: entity set the get valueme of data one or GetNextRequest more MIB objects in (instance,next a managed device. in list, block) GetBulkRequest Agent replies with a Response PDU, with the noerror InformRequest error status to confirm that the value has indeed been set. Mgr-to-Mgr: here s MIB value SetRequest Response Trap Mgr-to-agent: set MIB value Agent-to-mgr: value, response to Request Agent-to-mgr: inform manager of exceptional event Network Management 9-53
54 SNMP protocol: message types Message type GetRequest GetNextRequest GetBulkRequest InformRequest Function Mgr-to-agent: get me data (instance,next in list, block) Mgr-to-Mgr: here s MIB value Used SetRequest by the managing Mgr-to-agent: entity notify another set MIB managing value entity of MIB information that is remote to the receiving entity Response Agent-to-mgr: value, response Receiving entity replies to Request with a Response PDU, with the noerror error status to acknowledge receipt of the InformRequest Trap PDU. Agent-to-mgr: inform manager of exceptional event Network Management 9-54
55 SNMP protocol: message types Message type Function GetRequest Mgr-to-agent: get me data GetNextRequest Generated asynchronously (instance,next in list, block) GetBulkRequest Not in response to a received request; but In response to an event for which the managing entity needs notification InformRequest Well-known trap types are: Mgr-to-Mgr: here s MIB value Cold or warm start by a device, A SetRequest link going up (or down), The loss of a neighbor, or An authentication failure event Mgr-to-agent: set MIB value Response Agent-to-mgr: value, response A trap message has no required to Request a response from a managing entity Trap Agent-to-mgr: inform manager of exceptional event Network Management 9-55
56 SNMP protocol: message types Message type GetRequest GetNextRequest GetBulkRequest InformRequest SetRequest Response Trap Function Mgr-to-agent: get me data (instance,next in list, block) Mgr-to-Mgr: here s MIB value Mgr-to-agent: set MIB value Agent-to-mgr: value, response to Request Agent-to-mgr: inform manager of exceptional event Network Management 9-56
57 SNMP Message SNMP PDU is typically carried in the payload of a UDP datagram UDP is the preferred transport mapping. RFC1906 UDP is unreliable Request ID field is used by the managing entity to number its requests to an agent An agent s response takes its response ID from that of the received request Thus managing entity can detect lost requests or replies SNMP does not mandate any procedure for retransmission Network Management 9-57
58 SNMP protocol: message formats Network Management 9-58
59 SNMP Security and Administration SNMPv3 = SNMPv2 + Security + Admin Lack of security caused SNMP being used primarily for monitoring (not control)! Network Management 9-59
60 SNMPv3 Architecture SNMP Applications consists of: Command generator Notification receiver Proxy forwarder Typically found in a managing entity Command responder Notification originator Typically found in an agent Possibly other applications Network Management 9-60
61 SNMPv3 Architecture SNMP Applications consists of: Command generator Notification receiver Proxy Generates: forwarder GetRequest GetNextRequest Command responder GetBulkRequest, and Notification SetRequest originator Handles Possibly other Received applications responses to these PDUs Network Management 9-61
62 SNMPv3 Architecture SNMP Applications consists of: Command generator Executes Notification in an agent receiver Receives, Proxy forwarder processes and replies (using Response) to received requests Command responder Notification originator Possibly other applications Network Management 9-62
63 SNMPv3 Architecture SNMP Applications consists of: Received Command and generator processed by: Notification receiver Proxy forwarder Generates Trap PDUs Command responder Notification originator Possibly other applications Network Management 9-63
64 SNMPv3 Architecture SNMP Applications consists of: Command generator Notification receiver Proxy forwarder Forwards Request, Notification, Command Response responder PDUs Notification originator Possibly other applications Network Management 9-64
65 SNMPv3 Architecture SNMP Applications consists of: Command generator Notification receiver Proxy forwarder Command responder Notification originator Possibly other applications Network Management 9-65
66 SNMPv3 Engine and Applications SNMP Application Commander Generator PDU PDU Commander Responder Notification Receiver Notification Originator Proxy Forwarder Other Applications SNMP Engine Dispatching Message Processing System Timeliness, Authentication & Privacy Access Control Transport Layer Network Management 9-66
67 SNMPv3 Engine and Applications SNMP Application SNMP version is determined Commander Notification Generator A PDU is wrapped Receiver in a message header Commander containing: SNMP Responder version number, A message ID, and PDU PDU Message size Notification Originator Proxy Forwarder Other Applications Appropriate Authentication headers SNMP Engine Dispatching Message Timeliness, Processing Authentication Preferred transport protocol = UDP System & Privacy Preferred port number = 161 (port #162 for trap messages) Access Control Transport Layer Network Management 9-67
68 SNMPv3 Engine and Applications SNMP Application Commander Generator Commander Responder Notification Receiver Notification Originator Proxy Forwarder Other Applications SNMP Engine Dispatching Message Processing System Timeliness, Authentication & Privacy Access Control Transport Layer Network Management 9-68
69 SNMPv3 Security SNMP messages are used for: Monitoring (e.g. GetRequest) Control (e.g. SetRequest) An intruder who could intercept/generate SNMP messages could wreak havoc in the network Network Management 9-69
70 User-Based Security SNMPv3 security is called User-Based Security User: identified by a user-name Security information: password, key-value, or access privileges Services: Encryption, authentication, protection against playback attacks, and access control. Network Management 9-70
71 SNMP security and administration encryption: DES-encrypt SNMP message authentication: compute, send MIC(m,k): compute hash (MIC) over message (m), secret shared key (k) protection against playback: use nonce view-based access control SNMP entity maintains database of access rights, policies for various users database itself accessible as managed object! Network Management 9-71
72 Encryption SNMP PDU is encrypted by DES in CBC mode Secret key is shared with the receiving entity, for decryption Network Management 9-72
73 Authentication SNMPv3 uses Hash function (MD5) for authentication It uses along a secret key to provide Hash Message Authentication Code (HMAC) HMAC provides authentication and protection against tampering Network Management 9-73
74 Protection Against Play-Back Receiver requires that the sender include a value in each message that is based on a counter in the receiver The counter functions as a nonce. Counter value = f (time reboot + no. of reboots configuration ) Value is accepted if it is within a small margin of error of the receiver s actual value Network Management 9-74
75 Access Control SNMPv3 provides view-based access control It controls which network management information can be queried or set and by which users Access rights and policies are kept in a Local Configuration Datastore (LCD) Portions of the LCD are accessible as managed objects; Defined in the View-based Access Control Model Configuration MIB Can be managed and manipulated remotely by SNMP Network Management 9-75
76 Chapter 9 outline What is network management? Internet-standard management framework Structure of Management Information: SMI Management Information Base: MIB SNMP Protocol Operations and Transport Mappings Security and Administration The presentation problem: ASN.1 Network Management 9-76
77 ASN.1 Abstract Syntax Notation. One Network Management 9-77
78 The presentation problem Q: does perfect memory-to-memory copy solve the communication problem? A: not always! struct { char code; int x; } test; test.x = 256; test.code= a test.code test.x a host 1 format test.code test.x a host 2 format problem: different data format, storage conventions Network Management 9-78
79 A real-life presentation problem: grandma 2004 teenager aging 60 s hippie Network Management 9-79
80 Presentation problem: potential solutions 1. Sender learns receiver s format. Sender translates into receiver s format. Sender sends. real-world analogy? pros and cons? 2. Sender sends. Receiver learns sender s format. Receiver translate into receiver-local format real-world-analogy pros and cons? 3. Sender translates host-independent format. Sends. Receiver translates to receiver-local format. real-world analogy? pros and cons? Network Management 9-80
81 Solving the presentation problem 1. Translate local-host format to host-independent format 2. Transmit data in host-independent format 3. Translate host-independent format to remote-host format grandma aging 60 s hippie 2005 teenager Network Management 9-81
82 ASN.1: Abstract Syntax Notation 1 ISO standard X.680 used extensively in Internet like eating vegetables, knowing this good for you! defined data types, object constructors like SMI BER: Basic Encoding Rules specify how ASN.1-defined data objects to be transmitted each transmitted object has Type, Length, Value (TLV) encoding Network Management 9-82
83 TLV Encoding Idea: transmitted data is self-identifying T: data type, one of ASN.1-defined types L: length of data in bytes V: value of data, encoded according to ASN.1 standard Tag Value Type Boolean Integer Bitstring Octet string Null Object Identifier Real Network Management 9-83
84 TLV encoding: example Value, 259 Length, 2 bytes Type=2, integer Value, 5 octets (chars) Length, 5 bytes Type=4, octet string Network Management 9-84
85 Network Management: summary network management extremely important: 80% of network cost ASN.1 for data description SNMP protocol as a tool for conveying information Network management: more art than science what to measure/monitor how to respond to failures? alarm correlation/filtering? Network Management 9-85
Chapter 9. introduction to network management. major components. MIB: management information base. SNMP: protocol for network management
Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationNetwork Management. Stuart Johnston 08 November 2010
Network Management Stuart Johnston stuart.johnston@inmon.com 08 November 2010 Slides from: Computer Networking: A Top Down Approach, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007 All material
More informationNetwork Management. Stuart Johnston 13 October 2011
Network Management Stuart Johnston stuart.johnston@inmon.com 13 October 2011 Slides from: Computer Networking: A Top Down Approach, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007 All material
More informationSimple Network Management Protocol. Slide Set 8
Simple Network Management Protocol Slide Set 8 Network Management Framework Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for network
More informationNetwork Management. Raj Jain Raj Jain. Washington University in St. Louis
Network Management Raj Jain Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-09/
More informationNetwork control and management
Network control and management Network management What is network management?? Why is it needed? Mani Subramanian, Network Management: An introduction to principles and practice, Addison Wesley Longman,
More informationManaging and Securing Computer Networks INFO-056
Managing and Securing Computer Networks INFO-056 Prof. Guy Leduc Université de Liège Institut Montefiore, B28 B-4000 Liège 1 Phone: 04 3662698 ou 2696 (secrétariat) Email: Guy.Leduc@uliege.be URLs: http://progcours.ulg.ac.be/cocoon/cours/info0056-1.html
More informationText Book: Computer Networking: A Top Down Approach Featuring the Internet 3rd edition, by Jim Kurose and Keith Ross, Addison-Wesley
Network Management Text Book: Computer Networking: A Top Down Approach Featuring the Internet 3rd edition, by Jim Kurose and Keith Ross, Addison-Wesley these slides are based on USP Network Management
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationSNMP Basics BUPT/QMUL
SNMP Basics BUPT/QMUL 2014-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
More informationSNMP Basics BUPT/QMUL
SNMP Basics BUPT/QMUL 2017-05-22 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
More informationNetwork Layer: ICMP and Network Management
Network Layer: ICMP and Network Management EECS3214 18-03-15 4-1 Chapter 5: outline 5.1 introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet: OSPF 5.4 routing
More informationLecture 18: Network Management
Lecture 18: Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 18-1 Objective Manage a network by managing its components: routers, bridges,
More informationCOSC 301 Network Management
COSC 301 Network Management Lecture 20: Management Tools and Protocols Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 20: Management tools and protocols 1 What is Network Management?
More informationTELE 301 Network Management
TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?
More informationOutline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol
Outline SNMP Simple Network Management Protocol Several slides are courtesy of the Addison Wesley companion web site for textbook by Liebeherr and El Zarki and others added by M. Veeraraghavan, Univ. of
More informationSimple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
More informationSNMP Simple Network Management Protocol
SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:
More informationSNMP and Network Management
SNMP and Network Management Nixu Ltd Contents Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions 2 Network management When you have 100s of computers in a network or are
More informationStructure of Management Information
Structure of Management Information Structure of Management Information' (SMI) defines the general framework within which MIBs can be defined and constructed (STD58) SMI identifies data types usable in
More informationUnit 2. Internet based Network Management
Unit 2 Internet based Network Management Internet based Network Management In the Internet world Network management refers to management of networks, devices, and hosts Achieved through 'Simple Network
More informationSNMP and Network Management
Contents SNMP and Network Management Network Management MIB naming tree, MIB-II SNMP protocol SNMP traps SNMP versions Nixu Ltd 2 Network management When you have 100s of computers in a network or are
More informationChapter 23. Simple Network Management Protocol (SNMP)
Chapter 23 Simple Network Management Protocol (SNMP) 1 The McGraw-Hill Companies, Inc., 2000 1 CONTENTS CONCEPT MANAGEMENT COMPONENTS SMI MIB SNMP MESSAGES UDP PORTS SECURITY 2 The McGraw-Hill Companies,
More informationNET311 Computer Networks Management Standards, Models and Language
NET311 Computer Networks Management Standards, Models and Language Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa
More informationCSC 4900 Computer Networks: Routing Protocols
CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationNetwork Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science and Technology. 16.
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science and Technology Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in
More informationOutline Network Management MIB naming tree, MIB-II SNMP protocol Network management in practice. Network Management. Jaakko Kotimäki.
Outline MIB naming tree, MIB-II SNMP protocol Network management in practice 19.10.2010 Outline MIB naming tree, MIB-II SNMP protocol Network management in practice Outline Contents MIB naming tree, MIB-II
More informationCHAPTER. Introduction
CHAPTER 1 Network management takes place between two major types of systems: those in control, called managing systems, and those observed and controlled, called managed systems. The most common managing
More informationChapter 8 Network Security
Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationTSIN02 - Internetworking
Lecture 10: SNMP and AAA Literature: Forouzan, chapter 23 RFC2881 RFC2905 RFC2903 Diameter next generation's AAA protocol by Håkan Ventura (handouts) 2004 Image Coding Group, Linköpings Universitet Lecture
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationLecture 11: Introduction to Network Management
Lecture 11: Introduction to Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 11-1 Objective Manage a network by managing its components: routers,
More informationNetwork Management System
Network Management System NMS: Simple solution: Ping all elements routinely If machine down go and fix it Time stamps on ping packets indicate delay, congestion Becomes a problem with large and complex
More informationDC70 NETWORK MANAGEMENT DEC 2015
Q.2 a. Discuss the OSI protocol architecture in detail. List out, at least one salient service provided by each layer (8) IETE 1 IETE 2 b. Identify the various network management functions and the groups
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer ICMP (5.6), Network Management(5.7) & SDN (5.1, 5.5, 4.4) Prof. Lina Battestilli Fall 2017 Outline 5.6 ICMP: The Internet Control Message
More informationComputer Networks LECTURE 10 ICMP, SNMP, Inside a Router, Link Layer Protocols. Assignments INTERNET CONTROL MESSAGE PROTOCOL
Computer Networks LECTURE 10 ICMP, SNMP, Inside a Router, Link Layer Protocols Sandhya Dwarkadas Department of Computer Science University of Rochester Assignments Lab 3: IP DUE Friday, October 7 th Assignment
More informationSNMP. Agenda. Network Management Basics SNMP. RMON SNMPv2 Product Examples L64 - SNMP. Simple Network Management Protocol. Basics SMI MIB.
SNMP Simple Network Management Protocol Agenda Network Management Basics SNMP Basics SMI MIB RMON SNMPv2 Product Examples SNMP, v4.0 2 Page 64-1 What is it? A network management should... automate the
More informationCommand Manual SNMP-RMON. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 SNMP Configuration Commands... 1-1 1.1.1 display snmp-agent... 1-1 1.1.2 display snmp-agent community... 1-2 1.1.3 display snmp-agent group... 1-3 1.1.4 display
More informationLecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
More informationSNMP: Simplified. White Paper by F5
The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white
More informationApplications FTP. FTP offers many facilities :
Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol
More informationHyperText Transfer Protocol. HTTP Commands. HTTP Responses
Hyper Transfer Protocol HTTP - just a different file transfer protocol Simplified, standard client/server model just one connection for commands and data Data transferred is structured Similar to MIME
More informationSNMP. Simple Network Management Protocol. Chris Francois CS 417d Fall 1998
SNMP Simple Network Management Protocol Chris Francois CS 417d Fall 1998 cfrancois@acm.org What is Network Management? Basic tasks that fall under this category are: Configuration Management Keeping track
More informationSNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Network Management The network management is to Monitor the network Ensure the operations over the network are functional Assure the network works efficiently An
More informationTTM 4128 Exam May 19th 2012 (English) Task 1. SNMP and WEB-based management -General (35%) Please provide short and precise answers.
TTM 4128 Exam May 19th 2012 (English) Appendix 1: SNMPv2 PDU Definitions Appendix 2: ASN.1 BER Encoding Summary Task 1. SNMP and WEB-based management -General (35%) Please provide short and precise answers.
More informationChapter 28 Network Management: SNMP Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 28 Network Management: SNMP 28.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 28-1 NETWORK MANAGEMENT SYSTEM We can say that the functions performed
More informationRedesde Computadores(RCOMP)
Redesde Computadores(RCOMP) Lecture 11 2016/2017 Network management. SMTP application protocol. Instituto Superior de Engenharia do Porto Departamento de Engenharia Informática Redes de Computadores (RCOMP)
More informationTable of Contents 1 SNMP Configuration Commands RMON Configuration Commands 2-1
Table of Contents 1 SNMP Configuration Commands 1-1 SNMP Configuration Commands 1-1 display snmp-agent 1-1 display snmp-agent community 1-1 display snmp-agent group 1-3 display snmp-agent mib-view 1-4
More informationConfigure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.
This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationWeb Protocols and Practice
Web Protocols and Practice Dogan Kesdogan Aachen University of Technology Department of Computer Science IV Communication and Distributed Systems Introduction 1-1 Staff Instructor: Dogan Kesdogan, kesdogan@informatik.rwth-aachen.de
More informationCategory: Standards Track December 1998
Network Working Group M. Daniele Request for Comments: 2454 Compaq Computer Corporation Category: Standards Track December 1998 Status of this Memo IP Version 6 Management Information Base for the User
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCONTENT of this CHAPTER
CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.4.1 Problems in the Network??????? Is it a host problem? Weird switch behavior? Misconfigured box? (proxy?) Is a box out of service? Some networks
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Arquitecturas de Redes 3 Gestão de Redes e Serviços -
More informationChapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationInternet Management Overview
Internet Management Overview Based on the Manager-Agent Model Initially SNMPv1 (1990), SNMPv2 1996 Managed Objects similar to OSI attributes, specified through ASN.1 Macros the SNMP Structure of Management
More informationFor complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference
CHAPTER 51 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 4500 series switch. Note For complete syntax and usage information for the commands used
More informationChapter 30 Network Management (SNMP)
Chapter 30 Network Management (SNMP) Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 30-1 Overview Network Management SNMP Management information base (MIB) ASN.1 Notation
More informationThis chapter will describe the architecture that the
C H A P T E R 4 SNMPv3 Framework This chapter will describe the architecture that the SNMPv3 Framework is defined under. It will also show new textual conventions that have been defined for SNMPv3, along
More informationCS 471G Friday, 11 January Introduction 2-1
CS 471G Friday, 11 January 2013 Introduction 2-1 Chapter 1 Introduction A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in
More informationChapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationSNMP and Network Management
SNMP and Management Simple Management Protocol A Standard Protocol for Management SNMP how it was born In 1980 s, networks grew, hard to manage Many vendors, many protocols Many saw a need for standard
More informationConfiguring SNMP. Understanding SNMP CHAPTER
CHAPTER 28 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 2960 switch. For complete syntax and usage information for the commands used in this chapter,
More informationSNMPv2 Object Descriptions
CHAPTER 7 This chapter describes the individual MIB objects that comprise SNMPv2. The objects reside in the SNMPv2-MIB.my file. Contents of this chapter include: System Group Object Resource Information
More informationTSIN02 - Internetworking
TSIN02 - Internetworking Literature: Lecture 11: SNMP and AAA Forouzan, chapter 21 Diameter next generation's AAA protocol by Håkan Ventura, sections 2-3.3.6 RFC2881 (optional extra material) Outline:
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationRequest for Comments: 1901
Network Working Group Request for Comments: 1901 Category: Experimental SNMPv2 Working Group J. Case SNMP Research, Inc. K. McCloghrie Cisco Systems, Inc. M. Rose Dover Beach Consulting, Inc. S. Waldbusser
More informationNetwork Working Group D. Harrington. Inc. Obsoletes: 2271 R. Presuhn. Inc. B. Wijnen IBM T. J. Watson Research April 1999
Network Working Group D. Harrington Request for Comments: 2571 Cabletron Systems, Inc. Obsoletes: 2271 R. Presuhn Category: Standards Track BMC Software, Inc. B. Wijnen IBM T. J. Watson Research April
More informationChapter 3. Basic Foundations: Standards, Models, and Language. Presented by: Dr. Baha Alsaify
Chapter 3 Basic Foundations: Standards, Models, and Language Presented by: Dr. Baha Alsaify Outline SNMP Management communication protocol ASN.1 language Basic encoding rules Management application functions
More informationSound network management practices are critical to
Healthcare Depends on Quality Network Management Sound network management practices are critical to most businesses, and even more so in healthcare. Keeping networked resources available at all times is
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationA Brief Introduction to Internet Network Management. Geoff Huston
A Brief Introduction to Internet Network Management Geoff Huston gih@telstra.net What are we talking about? Network Management Tasks fault management configuration management performance management security
More informationSNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics
Simple Network Management Protocol Support, page 1 SNMP Basics, page 1 SNMP Management Information Base (MIB), page 2 Set Up SNMP, page 3 Import Previously Configured Windows SNMP v1 Community Strings,
More informationJ. Davin MIT Laboratory for Computer Science J. Galvin Trusted Information Systems, Inc. July 1992
Network Working Group Request for Comments: 1353 K. McCloghrie Hughes LAN Systems, Inc. J. Davin MIT Laboratory for Computer Science J. Galvin Trusted Information Systems, Inc. July 1992 Status of this
More informationPESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science and Engineering
INTERNAL ASSESSMENT TEST 2 Date : 01 04 201 Marks : 0 Subject & Code :Computer Networks 2(10CS64) Class : VI CSE B Name of faculty : Surbhi Agrawal Time : 8:30 to 10:00a.m Note: wer ALL Questions 1 a B
More informationBrief Introduction to the Internet Standard Management Framework
Part 2: Structure of Management Information Version 2 (SMIv2) The SMI is the Data Definition Language, based loosely on an old version of ASN.1 and used to model and define management information to be
More informationN E T W O R K M A N A G E M E N T P R I N C I P L E S R E V I E W
CS7012 N E T W O R K M A N A G E M E N T P R I N C I P L E S R E V I E W THE MANAGED OBJECT MANAGER / AGENT RELATIONSHIP Standard Interface Local (proprietary) Interface Manager Management Operations Agent
More informationJune The Internet-standard Network Management Framework consists of three components. They are:
Network Working Group Request for Comments: 1472 F. Kastenholz FTP Software, Inc. June 1993 Status of this Memo The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationConfiguring SNMP. Understanding SNMP CHAPTER
22 CHAPTER Configuring SNMP This chapter describes how to configure the ML-Series card for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage information for the
More informationNetwork Working Group. Category: Standards Track Nortel Networks S. Routhier Integrated Systems Inc. B. Wijnen Lucent Technologies March 2000
Network Working Group Request for Comments: 2576 Category: Standards Track R. Frye CoSine Communications D. Levi Nortel Networks S. Routhier Integrated Systems Inc. B. Wijnen Lucent Technologies March
More informationThe ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationChapter 2 Application Layer
Internet and Intranet Protocols and Applications Lecture 4: Application Layer 3: Socket Programming Spring 2006 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Chapter 2
More informationNetwork Management Standards Architectures & Applications. Network Management
Network Management Standards Architectures & Applications Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management
More informationNetwork Management & Monitoring Introduction to SNMP
Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
More informationNetwork Management. Network Management: Goals, Organization and Functions
Network Management Network Management: Goals, Organization and Functions Telecomm/Data Network A telecommunication/data network is composed from many network elements (switching systems, terminals, circuits
More informationConfiguring SNMP. Understanding SNMP CHAPTER
24 CHAPTER This chapter describes how to configure the the ML1000-2, ML100T-12, ML100X-8, and ML-MR-10 cards for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage
More informationSNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Outline Overview Protocol MIB Net-SNMP Network Management Tools Client Application Development 2 Network Management How to monitor your servers? Trying to use the
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK 219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationConfiguring Simple Network Management Protocol
Configuring Simple Network Management Protocol Finding Feature Information, page 1 Prerequisites for SNMP, page 1 Restrictions for SNMP, page 3 Information About SNMP, page 4 How to Configure SNMP, page
More informationQWEST Communications International Inc. Technical Publication
QWEST Communications International Inc. Technical Publication Customer Network Management for QWEST Frame Relay Service and QWEST Switched Multimegabit Data Service Copyright 1994, 1996, 2001 77376 QWEST
More information