the network management problems tajudin hassen. over view linking together of network management...
TRANSCRIPT
The Network The Network Management ProblemsManagement Problems
Tajudin HassenTajudin Hassen
Over ViewOver View
Linking together of Network Management Linking together of Network Management with continuing growth in traffic types and with continuing growth in traffic types and Volumes presents main problem.Volumes presents main problem.
The Growth adds Multiple NMS which The Growth adds Multiple NMS which increases operational expenseincreases operational expense
Growth of associated Management overhead.Growth of associated Management overhead. Strong need to reduce the cost of ownership Strong need to reduce the cost of ownership
and improve the return on investment (ROI). and improve the return on investment (ROI). Requirement of Automated flow-through Requirement of Automated flow-through
actionsactions
Requirement of Automated flow-Requirement of Automated flow-through actionsthrough actions
FCAPS areas included in the FCAPS areas included in the requirementrequirement
ProvisioningProvisioningDetecting faultsDetecting faultsChecking and verifying performanceChecking and verifying performanceBilling/accountingBilling/accounting Initiating repairs or network upgradesInitiating repairs or network upgradesMaintaining the network InventoryMaintaining the network Inventory
ContentsContents
•Bringing the Managed Data to the Code
•Scalability
•The Shortage of Development Skills for Creating management systems
•The Shortage of Operational Skills for running Networks
Bringing the Managed Data Bringing the Managed Data to the Codeto the Code
Managed objects reside on many SNMP agent Managed objects reside on many SNMP agent hostshosts
Copies of managed objects reside on SNMP Copies of managed objects reside on SNMP management systemsmanagement systems
Changes in agent data may have to be regularly Changes in agent data may have to be regularly reconciled with the management system copyreconciled with the management system copy
The quality of an NMS is inversely proportional to The quality of an NMS is inversely proportional to the gap between its picture of the network and the gap between its picture of the network and the actual state of the underlying network-the the actual state of the underlying network-the smaller the gap, the better the NMSsmaller the gap, the better the NMS
As managed NEs become more complex. An extra As managed NEs become more complex. An extra burden is placed on the management system.burden is placed on the management system.
SCALABILITYSCALABILITY
Today’s Network is Tomorrow’s NEToday’s Network is Tomorrow’s NELayer 2 VPN ScalabilityLayer 2 VPN ScalabilityVirtual Circuit Status MonitoringVirtual Circuit Status MonitoringMIB ScalabilityMIB ScalabilityOther Enterprise Network Scalability Other Enterprise Network Scalability
IssuesIssuesLarge Reading TrialsLarge Reading TrialsLarge NEsLarge NEs
Today’s Network is Tomorrow’s Today’s Network is Tomorrow’s NENE
A scalability problem occurs when an A scalability problem occurs when an increase in the number of instances increase in the number of instances of a given managed object in the of a given managed object in the network necessitates a network necessitates a compensating, proportional resource compensating, proportional resource increase inside the management increase inside the management system.system.
Corporate Data
Enterprise Management Systems IT Service level Management (Helpdesk solution, SLAs) Enterprise Network, Applications and Systems management Fault , Performance, Availability, Capacity Planning, and Bandwidth Management Software deployment Management, inventory, metering, distribution, remote desktop control, application healing, and centralised controls e.t.c
Layer 2 VPN ScalabilityLayer 2 VPN Scalability
A full mesh provides the necessary A full mesh provides the necessary connectivity for the VPN. Generally connectivity for the VPN. Generally referred to as the N squre problem.referred to as the N squre problem.
When the number of sites become When the number of sites become very large, virtual circuits required very large, virtual circuits required tends to become unmanagable.tends to become unmanagable.
Virtual Circuit Status Virtual Circuit Status MonitoringMonitoring
NMS attempts to read all table NMS attempts to read all table entriesentries
MIB table entries becomes very largeMIB table entries becomes very large
MIB ScalabilityMIB Scalability
Network operators and their users Network operators and their users increasingly demand increasingly demand
more bandwidth, more bandwidth, faster networks faster networks and bigger devices.and bigger devices.
Other Enterprise Network Other Enterprise Network Scalability IssuesScalability Issues
Scalability also affects the EnterpriseScalability also affects the EnterpriseStorage solutionsStorage solutionsAdministration of firewallsAdministration of firewallsRouters, such as access control lists Routers, such as access control lists
and static routesand static routesSecurity managementSecurity managementApplication managementApplication managementLarge NEsLarge NEs
Expensive and Scares Expensive and Scares Development Skill SetsDevelopment Skill Sets
A Solutions MindsetA Solutions Mindset
Distributed, Creative Problem SolvingDistributed, Creative Problem Solving
Taking OwnershipTaking Ownership
Acquiring Domain ExpertiseAcquiring Domain Expertise
A Solutions MindsetA Solutions Mindset
Reflects the move away from the Reflects the move away from the purely technological aspect of purely technological aspect of products to embrace the way products to embrace the way enterprises and service providers look enterprises and service providers look at overall solutions to business at overall solutions to business problems.problems.
FCAPS Software layersFCAPS Software layers
Distributed, Creative Problem Distributed, Creative Problem SolvingSolving
Software bugsSoftware bugsNE bugsNE bugsPerformance bottlenecksPerformance bottlenecksClient applications crashing Client applications crashing
intermittentlyintermittentlyMIB table corruptionMIB table corruptionSNMP agent exceptionSNMP agent exception
Taking OwnershipTaking Ownership
All NMS software developers should All NMS software developers should strive to extend their portfolio of strive to extend their portfolio of skills.skills.
Institutional memory relates to Institutional memory relates to individual developers with key individual developers with key knowledge of product infrastructureknowledge of product infrastructure
Acquiring Domain ExpertiseAcquiring Domain Expertise
Domain expertise represents a range Domain expertise represents a range of detailed knowledgeof detailed knowledge
Knowledge might includeKnowledge might includeLayer 2 and layer 3 traffic engineeringLayer 2 and layer 3 traffic engineeringLayer 2 and layer 3 QoSLayer 2 and layer 3 QoSNetwork ManagementNetwork ManagementConvergence of legacy technologies into Convergence of legacy technologies into
IPIPBackward and forward compatabilityBackward and forward compatability
Linked OverviewsLinked Overviews
An ATM Linked OverviewAn ATM Linked Overview
An IP Linked OverviewAn IP Linked Overview
Short Development CyclesShort Development Cycles
Minimizing Code ChangesMinimizing Code Changes
Elements of NMS DevelopmentElements of NMS Development
NMS DevelopmentNMS Development Data AnalysisData Analysis Upgrade ConsiderationUpgrade Consideration UML, Java, and Object-Oriented DevelopmentUML, Java, and Object-Oriented Development Class Design for Major NMS FeaturesClass Design for Major NMS Features GUI DevelopmentGUI Development Middleware Using CORBA-Based ProductsMiddleware Using CORBA-Based Products Insulating Applications from Low-Level CodeInsulating Applications from Low-Level Code
Expensive and Scarce Expensive and Scarce operational Skillsoperational Skills
The growing complexity of networks The growing complexity of networks is pointing to increasingly scarce is pointing to increasingly scarce operational skills.operational skills.
Multiservice SwitchesMultiservice Switches
MPLS: Second ChunkMPLS: Second Chunk
Explicit Route ObjectsExplicit Route Objects Resource BlocksResource Blocks Tunnels and LSPsTunnels and LSPs In-segments and Out-segmentsIn-segments and Out-segments Cross-ConnectsCross-Connects Routing ProtocolsRouting Protocols Signaling ProtocolsSignaling Protocols Label OperationsLabel Operations MPLS EncapsulationMPLS Encapsulation QoS and Traffic EngineeringQoS and Traffic Engineering QoSQoS
PROBLEMS POSED BY ENTERPRISE PROBLEMS POSED BY ENTERPRISE NETWORKINGNETWORKING
CONNECTIVITYCONNECTIVITYLOSS OF MANAGEMENT CONTROLLOSS OF MANAGEMENT CONTROLORGANIZATIONAL CHANGE ORGANIZATIONAL CHANGE
REQUIREMENTSREQUIREMENTSHIDDEN COSTS OF CLIENT/SERVER HIDDEN COSTS OF CLIENT/SERVER
COMPUTINGCOMPUTINGRELIABILITY & SECURITYRELIABILITY & SECURITY
**
COSTS OF CLIENT/SERVER COSTS OF CLIENT/SERVER SYSTEMSSYSTEMS
OPERATIONS & SUPPORTOPERATIONS & SUPPORT APPLICATION DEVELOPMENTAPPLICATION DEVELOPMENT HARDWARE, SOFTWARE, INSTALLATION, HARDWARE, SOFTWARE, INSTALLATION,
MAINTENANCEMAINTENANCE EDUCATION & EDUCATION & TRAININGTRAINING
**
HARDWARE; SOFTWARE; HARDWARE; SOFTWARE; TELECOMMUNICATIONS, DATA TELECOMMUNICATIONS, DATA RESOURCESRESOURCES
MORE COMPUTING POWER ON THE MORE COMPUTING POWER ON THE DESKTOPDESKTOP
NETWORK LINKING SMALLER NETWORK LINKING SMALLER NETWORKSNETWORKS
**
ENTERPRISE NETWORKENTERPRISE NETWORK
HARDWARE; SOFTWARE; HARDWARE; SOFTWARE; TELECOMMUNICATIONS, DATA TELECOMMUNICATIONS, DATA RESOURCESRESOURCES
MORE COMPUTING POWER ON THE MORE COMPUTING POWER ON THE DESKTOPDESKTOP
NETWORK LINKING SMALLER NETWORK LINKING SMALLER NETWORKSNETWORKS
**
ENTERPRISE NETWORKENTERPRISE NETWORK
MPLS: Second ChunkMPLS: Second Chunk
Explicit Route ObjectsExplicit Route ObjectsResource BlocksResource BlocksTunnels and LSPsTunnels and LSPs In-segments and Out-segmentsIn-segments and Out-segmentsCross-ConnectsCross-ConnectsRouting ProtocolsRouting Protocols
Explicit Route ObjectsExplicit Route Objects
ERO is a list of layer 3 address hops ERO is a list of layer 3 address hops inside an MPLS cloudinside an MPLS cloud
Describes a list of MPLS nodes Describes a list of MPLS nodes through which a tunnel passesthrough which a tunnel passes
EROs are used by signaling protocols EROs are used by signaling protocols (such as RSVP-TE) to create tunnels(such as RSVP-TE) to create tunnels
Resource BlocksResource Blocks
Components of resource block Components of resource block includeincludeMaximum reserved bandwidthMaximum reserved bandwidthMaximum traffic burst sizeMaximum traffic burst sizePacket lengthPacket length
Tunnels and LSPsTunnels and LSPs
MPLS-encapsulated packets enter the MPLS-encapsulated packets enter the tunnel exhibits 3 important tunnel exhibits 3 important characterscharactersForwarding is based on MPLS label Forwarding is based on MPLS label
rather than ip headerrather than ip headerResource usage is fixed, based on those Resource usage is fixed, based on those
reservedreservedPath taken by the traffic is constrained Path taken by the traffic is constrained
by the path chosenby the path chosen
Cross-ConnectsCross-Connects
Point-to-PointPoint-to-PointPoint-to-multipointPoint-to-multipointMultipoint-to-pointMultipoint-to-point
Routing ProtocolsRouting Protocols
MPLS incorporates standard IP MPLS incorporates standard IP routing protocols such as OSPF, IS-IS routing protocols such as OSPF, IS-IS and BGP4and BGP4
RouterRouter
Segments LANs into Segments LANs into distinct networks distinct networks and subnetworks; and subnetworks; e.g. the distinct red, e.g. the distinct red, green and blue green and blue LANs with distinct LANs with distinct network numbers.network numbers.
Segments LANs into Segments LANs into broadcast domainsbroadcast domains
3rd floor
2nd floor
1st floor
Ethernet switch
router
Signaling ProtocolsSignaling Protocols
Signaled connections haveSignaled connections haveResources reservedResources reservedLabels distributedLabels distributedPaths selected by protocols such as Paths selected by protocols such as
RSVP_TE or LDPRSVP_TE or LDP
Label OperationsLabel Operations
MPLS-labeled traffic forwarded based on MPLS-labeled traffic forwarded based on its encapsulation label valueits encapsulation label value
Current MPLS node uses Label2 encapsCurrent MPLS node uses Label2 encapsOperations executed against labels areOperations executed against labels are
LookupLookupSWAPSWAPPOPPOPPUSHPUSH
MPLS EncapsulationMPLS Encapsulation
The MPLS encapsulation specifies The MPLS encapsulation specifies four reserved label valuesfour reserved label values0-IPV4 explicit null that signals the 0-IPV4 explicit null that signals the
receiving nodereceiving node
1-Router alert that indicates to the 1-Router alert that indicates to the receiving nodereceiving node
2-IPV6 explicit null2-IPV6 explicit null
3-Implicit null that signals the receiving 3-Implicit null that signals the receiving nodenode
QoS and Traffic EngineeringQoS and Traffic Engineering
Providing specific chunks of Providing specific chunks of bandwidth (via MPLS LSPs) to the bandwidth (via MPLS LSPs) to the developers.developers.
Traffic engineering is set to become Traffic engineering is set to become a mandatory element of converged a mandatory element of converged layer 3 enterprise networks.layer 3 enterprise networks.
QoSQoS
Rating traffic as being equally Rating traffic as being equally importantimportant
Rating VOIP traffic as being the most Rating VOIP traffic as being the most importantimportant
Three approaches for network Three approaches for network servicesservicesBest effortBest effortFine granularity QoS (IntServ)Fine granularity QoS (IntServ)Coarse granularity QoS (DiffServ)Coarse granularity QoS (DiffServ)
MPLS and ScalabilityMPLS and Scalability
A network containing possibly tens or A network containing possibly tens or hundreds of thousands of MPLS hundreds of thousands of MPLS nodes.nodes.
It is not practical to try to read or It is not practical to try to read or write an object of this size using write an object of this size using SNMP.SNMP.
Tunnel-change tableTunnel-change tableTunnel tableTunnel table
SummarySummary Bringing managed data and code Bringing managed data and code
together is one of the central together is one of the central foundation of computing and network foundation of computing and network
managementmanagementAchieving union of data and code in a Achieving union of data and code in a
scalable fashion is a problem that gets scalable fashion is a problem that gets more difficult as networks grow.more difficult as networks grow.