1. Trang chủ
  2. » Cao đẳng - Đại học

Chapter 6.1: Network Management

44 1,5K 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 44
Dung lượng 835,39 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 6.1: Network Management Outline  Introduction  What is network management?  Evolution of Network Management  ISO Network Management Categories  Infrastructure for network management In the early days, network was small  Network management job includes  Installation: attach PCs, printers, etc. to LAN  Configuration: NICs, protocol stack, user app’s shared printers, etc.  Testing: Ping was sufficient to “manage” network  Config more devices: hub, switch, router, ..

Trang 1

Chapter 6.1:

Network Management

NGUYỄN CAO ĐẠT E-mail:dat@hcmut.edu.vn

Trang 2

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

2

Outline

Trang 3

Introduction

 In the early days, network was small

 Network management job includes

shared printers, etc

network

Trang 4

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

4

Introduction

 Above only deals with configuration

 Ongoing maintenance issues

Trang 5

Introduction

so more demands on network manager

and timely?

network to manage the network (remotely)

 Solving problem procedures

Trang 6

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

corporate web server

 Where do you begin?

 Where is the problem?

 What is the problem?

 What is the solution?

 Without proper network

management, these

questions are difficult to

Regional Offices

WWW Servers

Remote User

Trang 7

and procedures in place, you

may already have the answer

were made overnight?

notification indicating the issue?

breach?

predicted this behavior on an increasingly congested network link?

Trang 8

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

protocols and models used

in communication between

your management server and

the managed devices

Methods and tools that

allow you to interpret and act

upon gathered information

Availability

Predictability

Security

Trang 9

Outline

Trang 10

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

10

What is network management?

Definition by Saydam (in Journal of Networks and

System Management, published in Dec 1996)

integration and coordination of the hardware,

software, and human elements to monitor, test,

poll, configure, analyze, evaluate, and control

the network and element resources to meet the

real-time, operational performance, and Quality

of Service requirements at a reasonable cost."

Trang 11

What is network management?

 To ensure that the users of a network receive

the IT services with the quality of service (QoS) that they expect

Trang 12

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

12

Outline

Trang 13

Evolution of Network Management

 In 1977 International Organization for

Standards (ISO) began work on Open

Systems Interconnection (OSI) reference

model

coordination of standards developments for the purpose of system interconnection, while

allowing existing standards to be placed in perspective within the overall Reference Model”

 OSI model published in 1984

Trang 14

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

14

Evolution of Network Management

 In March 1987, effort to develop Simple

Gateway Monitoring Protocol (SGMP)

 About same time Common Mgmt

Information Protocol (CMIP) developed for

OSI model

 Effort to develop CMIP Over TCP (CMOT) as alternative to SGMP

Trang 15

Evolution of Network Management

 CMIP uses Remote Operations Services

Elements (ROSE)

in OSI model

 OSI mgmt process is richer and more

comprehensive than that provided by SNMP

 But OSI approach is more complex and took longer to develop

Trang 16

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

16

Evolution of Network Management

Activities Board (IAB) held meeting in 1988

Abstract Syntax Notation One (ASN.1)

on the mgmt agent

of TCP/IP networks

Trang 17

Outline

Trang 18

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

18

Top-down View of NM functions

Trang 19

Nework Management Functional

Trang 20

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

Trang 21

Fault Management

 Manages network problems to keep the

network running reliably and efficiently

 Fault management process involves the

following steps

manually

problem

Trang 22

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

22

Configuration Management

system configuration information and stores it in a configuration management database

administrators to track hardware, software, and

other network resources

Trang 23

Configuration Management

 Each network device has a variety of

information associated with it :

system, protocol software, or management software

or hardware controllers

problems with the device arise

location of the device

Trang 24

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

24

Configuration Management

Trang 25

Accounting Management

 Measures network utilization parameters in

order to regulate individual and group uses

Trang 26

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

26

Gather Network Device

Utilization Data

 Measure usage of resources by cost center

• Set quotas to enable fair use of resources

 Site metering to track adherence to software licensing

Bill Users of Network

Resources

• Set charges based on usage

 Measure one of the following

 Number of transactions

 Number of packets

• Number of bytes

• Set charges on direction of information flow

Use and Accounting

Management Tools

 Query usage database to measure statistics versus quotas

 Define network billing domains

• Implement automatic billing based on usage by users in the domain

 Enable billing predictions

 Enable user selection of billing domains on the network map

Reporting  Create historical billings trends

 Automatic distribution of billing to Cost Centers

• Project future billings by cost center

Trang 27

Performance Management

measuring and managing various network performance

variables

response times, line utilization, and others

performance levels

each variable so that exceeding these thresholds indicates a network problem worthy of attention

Trang 28

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

2.000 Duration 1:40 Color Scale Counter Instance Parent Object Computer

1.000

1.000 1.000 1.000 1.000

% Processor Time

% Processor Time

% Disk Time Page/sec Bytes Received/sec

_Total

explorer

0 C: D:

- - - Default FTP Site

Performance

Console Window Help

Action View Favorites

Trang 29

Performance Management

 Reactive

is, a user-defined threshold is exceeded), the managed device reacts by sending an alert to the network management system (NMS)

 Proactive

growth will affect performance metrics These simulations alert administrators to impending problems before they affect network users

Trang 30

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

30

Performance Management

 Reactive PM Components

performance variables in managed devices

exceeded, the NMS or the managed device detects the problem

generates an alert and sends it to the NMS

alerting the network administrator

Trang 31

Windows Task Manager

Windows Task Manager

File Options View Windows Help

Applications Processes Performance

Building Schematic - Paint Memo to Supervisor - WordPad Calculator

My Computer

Running Running Running Running

End Task Switch To New Task

CPU Usage: 2% Mem Usage: 103500K / 310892K

Windows Task Manager

File Options View Help

Processes: 30 CPU Usage: 6% Mem Usage: 103452K / 310892K

Applications Processes Performance Image Name PID CPU CPU Time Mem Usage

System Idle Process System

smss.exe csrss.exe winlogon.exe services.exe lsass exe svchost exe spoolsv exe mspaint exe msdtc exe inojobsv exe dfssvc exe svchost exe ismserv exe llssrv exe ntfrs.exe regsvc.exe

16 K

212 K

344 K 1,820 K 4,408 K 8,228 K 15,768 K 2,648 K 4,184 K

352 K 3,428 K 5,704 K 2,336 K 3,416 K 5,348 K 3,860 K 1,108 K

844 K

Show processes from all users End Process

Windows Task Manager

File Options View Help Applications Processes Performance

Processes: 30 CPU Usage: 3% Mem Usage: 101600K / 310892K

CPU Usage

MEM Usage

CPU Usage History

Memory Usage History

Total Limit Peak

Total Available System Cache

Total Paged Nonpaged

Trang 32

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

32

Security Management

prevents network sabotage (intentional or unintentional) and unauthorized access to sensitive information

environment This includes:

Trang 33

Security Management

 Security monitoring

 Alert handling

Trang 34

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

• Assigning user rights and permissions

• Recording failed logins

• Employing virus scanning

• Limiting views of the Enterprise network

Trang 35

Using Access

Control

Methods

• Encryption

• Packet filtering at routers

• Packet filtering at firewalls

• Source host authentication

• Executing security attack programs (Network Intrusion Detection)

• Detecting and documenting breaches Accessing

Public Data

Networks

• No restrictions - hosts are responsible for securing all access points

• Limited access - only some hosts can interface with the Public Data Network using a proxy server

• Security Manager shows a security event on the network map

• Reports of invalid access point attempts are generated daily for analysis

Trang 36

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

36

Outline

Trang 37

Infrastructure for network management

Trang 38

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

38

Infrastructure for network management

 Managed Device

hub, bridge, workstation

be managed

 Managing Entity

Trang 39

Infrastructure for network management

 Network Management Protocol

devices

managed devices and take actions at the devices via its agents

entity of exceptional events

 Managing agents located at managed devices are

Trang 40

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

40

Network management example

Transport Presentation

Data Link

Session Network Physical

Agent Process

Mgmt Protocol

Managed Device

Presentation Transport Data Link

Session Network Physical

Mgmt Process

Mgmt Protocol

Managing Entity Mgmt

App

Trang 41

Network management example

request to mgmt process

managed device through the network

managing entity through the network

Trang 42

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

42

Network Management Overhead

 There is overhead in terms of

information/packets

receiving responses

 A tradeoff between cost and benefit

Trang 43

Network Management Systems

tools for network monitoring and control

management tasks can be performed

works and etc

Trang 44

Hochiminh City University Of Technology

Computer Science & Engineering

© 2014

Computer Networks 2 Chapter 6: Network Management

Network

Agent

Network Agent

Network

Objects

Network Objects

NMS Vendor B

Network Agent

Network Agent

Network Objects

Network Objects

Mes s ages Services & Protocols

• Message exchange between NMSs managing different domains

Vendor A

(b) Services and Protocols

Application Services

Managem ent Protocol

Trans port Protocols

Objects

Objects

Vendor B

Objects Objects

Figure 1.23 Network Management Dumbbell Architecture

Ngày đăng: 26/11/2016, 02:15

TỪ KHÓA LIÊN QUAN