Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.

Post on 24-Dec-2015

218 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

Transcript

Network ManagementConcepts and Practice

Author: J. Richard Burke

Presentation by Shu-Ping Lin

Outline

Network Components Overview of Network Management

Communication Architecture

A communication architecture integrates many protocols and the software that implements them.

These parts can be developed independently of one another as long as the developers adhere to the standard interfaces between them.

OSI Reference Model

OSI Reference Model

The model does not specify how to implement the function in each layer.

The functions in each layer are defined by protocol, which are implemented in software.

The software in each layer provides services to the layer above it.

Layering concept simplifies the development process and allows improvements of software in one layer without affecting other layers.

Physical Layer

This layer defines the electrical, mechanical, functional specifications for hardware that connects a device to the network.

Physical layer standards would specify Connector’s size and shape Exact number of pins The signals that can be used to those

pins

Data Link Layer

This layer specifies the procedures in order to achieve reliable point-to-point transfer of information between two devices.

Data link layer can be divided into two sublayers. Logical Link Control Medium Access Control

Data Link Layer (cont’d)

CSMA/CD is implemented in Ethernet. CSMA means that a computer waits until the

re is no signal from any other computer on LAN before transmitting a message.

CD reduces the probability that a collision will occur by backoff its transmission.

Bridge is a typical device working on data link layer.

Network Layer

This layer provides the mechanisms for transporting a packet from the source networks to the destination network.

Packets are messages constructed by the network layer and higher layers.

A router is called a network layer device because it is controlled by protocols up to and including the network layer.

Transport Layer

Transport layer provides reliable and unreliable transport protocols.

The reliable protocol, which is called the Transport Control Protocol (TCP), provides the mechanisms that enable end-to-end reliability.

TCP accomplishes this by the use of automated acknowledgement and automated retransmissions.

Transport Layer (cont’d)

The unreliable transport protocol, which is called the User Datagram Protocol (UDP), places no constrains on the network.

Best-effort delivery from the source device to the destination device is all that is required.

UDP is used when speed is of the essence and the effort spent on ensuring reliability is not cost-effective.

Session Layer

The Session layer provides the mechanisms necessary to open and close multiple logical connections between processes on different PCs.

These logical connections are called session.

Many logical connections can use the same physical connection.

Presentation Layer

This layer provides a common representation of data transferred between peer application layer entities on different stations.

Abstract syntax notation.one (ASN.1) format is useful for application layer.

However, the layers below the presentation layer use a formant call transfer syntax.

The presentation layer translates between ASN.1 and transfer syntax.

Application Layer

Common Application Service Elements provide service generally useful to a variety of application programs provided by vendors.

Specific Application Service Elements service the additional needs of particular application programs.

Frames

Frame construction Application program makes a request. The request is passed to the appropriate

application-layer-entity. The application-layer-entity constructs an

Application layer protocol data unit (PDU). The Application layer PDU is then passed

to the appropriate presentation-layer-entity. This entity constructs a Presentation layer PDU.

Frames (cont’d)

PDUs continue to be constructed and passed to the layers below. This process continues until the Network layer PDU is received by the Data Link layer.

The frame is construct in the Data Link layer. The Network Layer PDU is encapsulated in a Data Link layer header and trailer.

Frames (cont’d)

TCP/IP Protocol Stack

Network Device

Workstations Servers Repeaters Hubs Bridges Switches Routers Probes

Workstations

Workstations typical make use of the services of all layers of a protocol stack because they process the requests of application programs for information on servers.

Server is like workstation making use of all layers of the protocol stack.

Repeater

Repeater amplifies the signal between segments and extends the length of a LAN.

Repeaters are used on 10BASE2 and 10BASE5 LANs.

Hubs

A hub is a repeater with many input and output ports.

Every transmission received by the hub on one port is amplified and retransmitted out of all other ports.

Hub do not examine information in any field of the frame.

Repeaters and hubs are consider a Physical layer device.

Bridges

Transparent bridge divides a LAN into segments that use the

same media access control specification and it controls what traffic is passed between segments.

uses bridge table to learn which devices are on which segments.

Translating bridges connects networks using different MAC layer specifications.

Bridges (cont’d)

Errors and collisions that take place on one segment are not propagated to devices on the other segment.

The use of switches rather than bridges is commonplace today.

Switches

A switch is a multiport bridge. Switches are typically configured to forward i

ncoming frames to outgoing ports based on destination MAC addresses associated with those ports in the switch table.

Switches also can be configured to drop frames based on MAC destination or to redirect frames to other MAC address.

Switches (cont’d)

Higher layers of the protocol stack are now being implemented in switches.

Layer 3 switch also can function like router.

Routers

Router reads the Network layer header in packet to find the destination network address and then looks up the address in routing table.

The routing table is a list of mappings of network addresses to ports that will get the packet to the destination networks by the best means.

Routers (cont’d)

Routing table

Probes

Probes are tools for learning about the details of the communication between devices.

Probes can be placed on a network and the information they gather transferred to the Management Station fro analysis of the traffic.

Outline

Network Components Overview of Network Management

Network Management

Jobs of network management in early day Attaching PCs and server to a LAN using Net

work Interface Cards (NICs) Installing protocol stacks Configuring NIC I/O addresses and interrupts

so as not to conflict with other NIC selections. Using Ping application to ensure that all devi

ces on the network could communicate with one another

Network Management (cont’d)

Access control The manager might write a script for the

server to control access to information on it.

The script would provide access to drives, folders or files that use or group of users needed.

Install a print server to manage the print jobs from each of the PCs.

Network Management (cont’d) Network configuration

If the networks were to be divided into subnets, then a bridge would be used to connect them.

The manager would configure a routing table to enable connectivity according to network address, subnet address and subnet mask.

Finally, installing user applications on PCs is necessary for interfacing correctly with OS.

Maintenance

After configuring primary network ingredients, here comes the maintenance.

Network performance is not optimized, there will be software and hardware failures and network resources will change.

The manager is required to make estimates of the network capacity.

There was a need for minimal security.

Maintenance (cont’d)

New work management has divided into specialties nowadays.

Administration Backing up servers Maintaining security Installing OS and applications

Network engineer Be responsible for the health of the

network and its availability to user.

Network-Based Management As network has grown larger and more complica

ted, network manager needed to find more efficient way to determine and control the state of network.

Some protocols could be used by network manager to remotely control devices. Simple Network Management Protocol (SNM

P) Management Information Base (MIBs) Network Management Systems (NMS)

Network Management Protocol Stack

Management Station and Management Agent.

Network Management Example

Step 1 NMS calls for the service of the management process

Step 2 the management process call the program the

implements network management protocol. Step 3

NMP constructs a request packet to the program on the management agent.

Step 4 NMP on the management agent cause the request

packet to be passed to the agent process.

Network Management Example (cont’d)

Step 5 The agent process accesses the value of the

requested variable and passes it to NMP. Step 6

NMP constructs the response packet which is sent back to the management station.

Step 7 At the management station the program that

implements the NMP receives the response packet. Step 8

The management process passes the requested value to the application program.

top related