network management concepts and practice
DESCRIPTION
Network Management Concepts and Practice. Author: J. Richard Burke Presentation by Shu-Ping Lin. Outline. Network Components Overview of Network Management. Communication Architecture. A communication architecture integrates many protocols and the software that implements them. - PowerPoint PPT PresentationTRANSCRIPT
Network ManagementConcepts and Practice
Author: J. Richard Burke
Presentation by Shu-Ping Lin
Outline
Network Components Overview of Network Management
Communication Architecture
A communication architecture integrates many protocols and the software that implements them.
These parts can be developed independently of one another as long as the developers adhere to the standard interfaces between them.
OSI Reference Model
OSI Reference Model
The model does not specify how to implement the function in each layer.
The functions in each layer are defined by protocol, which are implemented in software.
The software in each layer provides services to the layer above it.
Layering concept simplifies the development process and allows improvements of software in one layer without affecting other layers.
Physical Layer
This layer defines the electrical, mechanical, functional specifications for hardware that connects a device to the network.
Physical layer standards would specify Connector’s size and shape Exact number of pins The signals that can be used to those
pins
Data Link Layer
This layer specifies the procedures in order to achieve reliable point-to-point transfer of information between two devices.
Data link layer can be divided into two sublayers. Logical Link Control Medium Access Control
Data Link Layer (cont’d)
CSMA/CD is implemented in Ethernet. CSMA means that a computer waits until the
re is no signal from any other computer on LAN before transmitting a message.
CD reduces the probability that a collision will occur by backoff its transmission.
Bridge is a typical device working on data link layer.
Network Layer
This layer provides the mechanisms for transporting a packet from the source networks to the destination network.
Packets are messages constructed by the network layer and higher layers.
A router is called a network layer device because it is controlled by protocols up to and including the network layer.
Transport Layer
Transport layer provides reliable and unreliable transport protocols.
The reliable protocol, which is called the Transport Control Protocol (TCP), provides the mechanisms that enable end-to-end reliability.
TCP accomplishes this by the use of automated acknowledgement and automated retransmissions.
Transport Layer (cont’d)
The unreliable transport protocol, which is called the User Datagram Protocol (UDP), places no constrains on the network.
Best-effort delivery from the source device to the destination device is all that is required.
UDP is used when speed is of the essence and the effort spent on ensuring reliability is not cost-effective.
Session Layer
The Session layer provides the mechanisms necessary to open and close multiple logical connections between processes on different PCs.
These logical connections are called session.
Many logical connections can use the same physical connection.
Presentation Layer
This layer provides a common representation of data transferred between peer application layer entities on different stations.
Abstract syntax notation.one (ASN.1) format is useful for application layer.
However, the layers below the presentation layer use a formant call transfer syntax.
The presentation layer translates between ASN.1 and transfer syntax.
Application Layer
Common Application Service Elements provide service generally useful to a variety of application programs provided by vendors.
Specific Application Service Elements service the additional needs of particular application programs.
Frames
Frame construction Application program makes a request. The request is passed to the appropriate
application-layer-entity. The application-layer-entity constructs an
Application layer protocol data unit (PDU). The Application layer PDU is then passed
to the appropriate presentation-layer-entity. This entity constructs a Presentation layer PDU.
Frames (cont’d)
PDUs continue to be constructed and passed to the layers below. This process continues until the Network layer PDU is received by the Data Link layer.
The frame is construct in the Data Link layer. The Network Layer PDU is encapsulated in a Data Link layer header and trailer.
Frames (cont’d)
TCP/IP Protocol Stack
Network Device
Workstations Servers Repeaters Hubs Bridges Switches Routers Probes
Workstations
Workstations typical make use of the services of all layers of a protocol stack because they process the requests of application programs for information on servers.
Server is like workstation making use of all layers of the protocol stack.
Repeater
Repeater amplifies the signal between segments and extends the length of a LAN.
Repeaters are used on 10BASE2 and 10BASE5 LANs.
Hubs
A hub is a repeater with many input and output ports.
Every transmission received by the hub on one port is amplified and retransmitted out of all other ports.
Hub do not examine information in any field of the frame.
Repeaters and hubs are consider a Physical layer device.
Bridges
Transparent bridge divides a LAN into segments that use the
same media access control specification and it controls what traffic is passed between segments.
uses bridge table to learn which devices are on which segments.
Translating bridges connects networks using different MAC layer specifications.
Bridges (cont’d)
Errors and collisions that take place on one segment are not propagated to devices on the other segment.
The use of switches rather than bridges is commonplace today.
Switches
A switch is a multiport bridge. Switches are typically configured to forward i
ncoming frames to outgoing ports based on destination MAC addresses associated with those ports in the switch table.
Switches also can be configured to drop frames based on MAC destination or to redirect frames to other MAC address.
Switches (cont’d)
Higher layers of the protocol stack are now being implemented in switches.
Layer 3 switch also can function like router.
Routers
Router reads the Network layer header in packet to find the destination network address and then looks up the address in routing table.
The routing table is a list of mappings of network addresses to ports that will get the packet to the destination networks by the best means.
Routers (cont’d)
Routing table
Probes
Probes are tools for learning about the details of the communication between devices.
Probes can be placed on a network and the information they gather transferred to the Management Station fro analysis of the traffic.
Outline
Network Components Overview of Network Management
Network Management
Jobs of network management in early day Attaching PCs and server to a LAN using Net
work Interface Cards (NICs) Installing protocol stacks Configuring NIC I/O addresses and interrupts
so as not to conflict with other NIC selections. Using Ping application to ensure that all devi
ces on the network could communicate with one another
Network Management (cont’d)
Access control The manager might write a script for the
server to control access to information on it.
The script would provide access to drives, folders or files that use or group of users needed.
Install a print server to manage the print jobs from each of the PCs.
Network Management (cont’d) Network configuration
If the networks were to be divided into subnets, then a bridge would be used to connect them.
The manager would configure a routing table to enable connectivity according to network address, subnet address and subnet mask.
Finally, installing user applications on PCs is necessary for interfacing correctly with OS.
Maintenance
After configuring primary network ingredients, here comes the maintenance.
Network performance is not optimized, there will be software and hardware failures and network resources will change.
The manager is required to make estimates of the network capacity.
There was a need for minimal security.
Maintenance (cont’d)
New work management has divided into specialties nowadays.
Administration Backing up servers Maintaining security Installing OS and applications
Network engineer Be responsible for the health of the
network and its availability to user.
Network-Based Management As network has grown larger and more complica
ted, network manager needed to find more efficient way to determine and control the state of network.
Some protocols could be used by network manager to remotely control devices. Simple Network Management Protocol (SNM
P) Management Information Base (MIBs) Network Management Systems (NMS)
Network Management Protocol Stack
Management Station and Management Agent.
Network Management Example
Step 1 NMS calls for the service of the management process
Step 2 the management process call the program the
implements network management protocol. Step 3
NMP constructs a request packet to the program on the management agent.
Step 4 NMP on the management agent cause the request
packet to be passed to the agent process.
Network Management Example (cont’d)
Step 5 The agent process accesses the value of the
requested variable and passes it to NMP. Step 6
NMP constructs the response packet which is sent back to the management station.
Step 7 At the management station the program that
implements the NMP receives the response packet. Step 8
The management process passes the requested value to the application program.