Network Management Systems 10CS834 PDF
Network Management Systems 10CS834 PDF
com
SYLLABUS
Subject Code: 10CS834 Exam Hours: 03
I.A Marks: 25 Total Hours: 52
Hours/Week: 04 Exam Marks: 100
m
Provisioning, Network Operations and the NOC, Network Installation and Maintenance; Network and
co
System Management, Network Management System platform, Current Status and Future of Network
Management.
s.
bu
2. Basic Foundations: Standards, Models, and Language: Network Management Standards, Network
Management Model, Organization Model,Information Model Management Information Trees,
la
Managed object Perspectives, Communication Model; ASN.1- Terminology, Symbols, and Conventions,
yl
Objects and Data Types, Object Names, An Example of ASN.1 from ISO 8824; Encoding Structure;
lls
3. SNMPv1 Network Management: Managed Network: The History of SNMP Management, Internet
w
Organizations and standards, Internet Documents, The SNMP Model, The Organization Model, System
w
Information, Managed Objects, Management Information Base. The SNMP Communication Model The
SNMP Architecture, Administrative Model,SNMP Specifications, SNMP Operations, SNMP MIB Group,
Functional Model.
4. SNMP Management RMON: Remote Monitoring, RMON SMI and MIB,RMONI1- RMON1 Textual
Conventions, RMON1 Groups and Functions,
1
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Technolo gy Role of the ADSL Access Net work in an Overall Net work,
co
ADSL Architecture, ADSL Channeling Schemes, ADSL Encoding Schemes;
ADSL Management ADSL Network Management Elements, ADSL
s.
Configuration Management, ADSL Fault Management, ADSL Performance
bu
Management, SNMP-Based ADSL Line MIB, MIB Integration with Interfaces
Groups in MIB-2, ADSL Configuration Profiles.
la
correlation Model, State Transition Graph Model, Finite State Machine Model,
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
TEXT BOOKS:
Mani Subramanian: Network Management- Principles and Practice, 2nd
Pearson Education, 2010.
REFERENCE BOOKS:
J. Richard Burke: Network management Concepts and Practices: a Hands-On
Approach, PHI, 2008.
m
co
s.
bu
la
yl
lls
.a
w
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
TABLE OF CONTENTS
1. Introduction 6-14
m
2. Basic Foundations: Standards, Models, and Language 15-27
co
2.1 Network Management Standards
2.2 Network Management Model
s.
2.3 Organization Model
2.4 Infor mation Model
bu
2.5 Co mmunication Model
2.6 ASN.1
la
2.7 Functional Model
yl
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
6.4 Security Management
6.5 Policy-Based Management
co
6.6 Service Level Management
s.
bu
la
yl
lls
.a
w
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Chapter 1
I NT RO D U C T I O N
Characteristics:
It is Reliable - does what is expected of it
Dependable - always there when you need
it (remember 911?)
Good quality (connection) - hearing each
other well
The reasons for that are good planning, design, and implementation .Good operation and
management of network.
m
Telephone Network Model
Notice the hierarchy of switches
co
Primary and secondary routes programmed
Automatic routing
Where is the most likely failure?
s.
Use of Operations Systems to ensure QoS
bu
To other
Regional centers
Sectional centers
la
Regional Center Regional Center Primary centers
Cla ss 1 switch Cla ss 1 switch Toll centers
yl
En d offices
To other
lls
En d offices
w
Monitor telephone network parameters S/N ratio, transmission loss, call blockage, etc.
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Data communication network
co
T erminal T erminal
Host
s.
bu
Modem Modem Modem
la
Loop Loop Loop
yl
lls
Voice Voice
.a
IBM System Network Architecture (SNA) is a major step in network architecture SNA is based
on multitude of (dumb) terminals accessing a mainframe host at a remote location
LAN-WAN Network
LAN A LAN B
B r id g e / B rid g e /
Router Router
B r id g e /
Router
LAN C
WAN
communication link
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
W o r k s t a t io n W o r k s t a t io n
Cluster Cluster
controller controller
Communications
Communications
controller
controller
m
co
s.
M a in f r a m e
bu
Figure 1.3 IBM Systems Network Architecture Mo del
la
Major impacts of DCE are no more monopolistic service provider, no centralized IT controller,
yl
hosts doing specialized function and Client/Server architecture formed the core of DCE network
lls
Client/Server Model
.a
Control
w
transf er
Client Server
w
Control
transf er
w
For example in Post office analogy; clerk the server, and the customer the client. Client always
initiates requests and Server always responds. Notice that control is handed over to the receiving
entity.
1.3 TCP/IP Based Networks
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
intra- and inter-modules
Communication standards
co
Agreement between manufacturers on protocols of communication equipment on
physical characteristics and
s.
operational procedures bu
1.4 Communication protocols and standards
la
yl
User A User Z
Peer-Protocol Interface
lls
Physical Medium
User A User Z
Peer-Protocol Interface
T r a n s p o rt L a y e r
T r a n s p o rt L a y e r s T r a n s p o rt L a y e r s
Conversion
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 1 Physical
m
Physical medium
co
Figure 1.6 OSI Protocol Layers
s.
OSI Layers and Services
There are similarities between SNA and OSI. Simplicity of Internet specifies only layers
bu
3 and 4 .There is integrated application layers over Internet. Commonality of layers 1 and 2 as in
IEEE standard as shown in table
la
Application Protocols
yl
lls
P ro t o c o l In t e rch an g e St an d a rd
w
Loss of connectivity
Duplicate IP address
Intermittent problems
Network configuration issues
Non-problems
P e r f o r m a n c e p ro b l e m s
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Reliability
Non-real time problems
Rapid technological advance
Managing client/server environment
Scalability
Troubleshooting tools and systems
Trouble prediction
Standardization of operations - NMS helps
Centralized management vs sneaker-net
m
1 Physical -Transfers to and gathers from the physical medium raw
bit data
co
-Handles physical and electrical interfaces to the
transmission medium
2 Data link
s.
-Consists of two sublayers: Logical li nk control (LLC) and
bu
Media access control (MAC)
-LLC: Formats the data to go on the medium; performs
la
error control and flow control
yl
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
SN A OSI I N T E R NE T
S NICP
Network
IP
Path Control Network SNDCP
SNDAP
Physical Physical
m
co
Figure 1.7 Comparisons of OSI, Internet, and SNA Protocol Layer Models
s.
bu
1.7 Network Management
la
yl
Network
Management
lls
.a
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Net wor k
Users
TT Restoration
New Performance & Traffic Data
Technology
m
F aul t T T
co
Installation
s.
Figure 1.9 Network Management Functional Flow Chart
bu
Network Management Components
la
NMS
yl
lls
.a
Network Network
Agent Agent
w
w
w
Network Network
Objects Objects
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Interoperability
NM S Messages NM S
Vendor A Services & Protocols Vendor B
m
co
Application
s.
Se r v i c e s
Objects O bj ec t s
bu
Management
Ve n d o r A Ve n d o r B
Pr o t o c o l
la
O bj ec t s O bj ec t s
Tr ans p or t
yl
Pr o t o c o l s
lls
SN M P m an ag em en t
Limited CMIP management
Operations systems
Polled systems
Future trends:
Object-oriented approach
Service and policy management
Business management
Web-based management
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Chapter 2
Basic Foundations: Standards, Models, and Language
Introduction
Network Management is the management of the network resources comprising nodes
(e.g., hubs, switches, routers) and links (e.g., connectivity between two nodes). System
Management is the management of systems and system resources in the network. Network
Management can also be defined as OAM&P (Operations, Administration, Maintenance, and
Provisioning) of network and services.
m
S t a n d a rd Salient Points
OSI / CMIP International standard (ISO / OSI)
co
Management of data communications network - LAN and
W AN
s.
Deals with all 7 layers
bu
Most complete
Object oriented
la
W ell structured and layered
Consumes large resource in implementation
yl
Internet
Originally intended for management of Internet components,
currently adopted for W AN and telecommunicati on systems
.a
Easy to implement
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Network
Management
m
co
Organization Information Communication Functional
Model Model Model Model
s.
bu
Figure 2.1 OSl Network Management Model
la
components and their relationships. The OSI Information deals with Structure of management
information (SMI), it deals with syntax and semantics. It contains Management information base
lls
(MIB) and MIB deals with organization of management information. The Communication
models consists of Transfer syntax with bi-directional messages, Transfer structure (PDU).The
.a
Configure components
Monitor components
w
Measure performance
Secure information
Usage accounting
2.3 Organizational Model
This describes components of network management and their relationship. It defines the
terms object, agent and manager.
Manager is responsible for
o Manages the managed elements
o Sends requests to agents
o Monitors alarms
o Houses applications
o Provides user interface
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Two-Tier Model
MD B Manager
m
co
s.
Managed objects
bu
Unm anaged objects
Agent process
yl
lls
The Agent built into network element for example the Managed hub, managed router. An
w
agent can manage multiple elements for example the Switched hub, ATM switch. The MDB is a
physical database. Unmanaged objects are network elements that are not managed - both hysical
w
Three-Tier Model
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
M DB Manager
M DB Agent / Manager
Managed objects
MDB Management Database
Ag e n t p r o c e s s
m
co
Manager of Managers
s.
bu
MoM MD B
la
A ge nt Agent
yl
Managed objects
w
Manage d objects
w
w
Agent NMS
Agent process
Agent Network Management System manages the domain. Manager of Managers (MoM)
presents integrated view of domains. The Domain may be geographical, administrative, vendor-
specific products, etc
Peer Network Management Systems
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Age nt N M S Ma n a g e r N MS
Ma n a g e r N MS A g e n t N MS
m
Figure in a book uniquely identified by ISBN, Chapter, and Figure number in that
hierarchical order. The ID: {ISBN, chapter, figure}. The three elements above define the
co
syntax. Semantics is the meaning of the three entities according to Websters dictionary. The
information comprises syntax and semantics about an object.
sysDescr: {system1}
lls
Sy n t ax : OCTET STRING
Definition: "A textual description of the entity "
.a
Access: read-only
Status: mandatory
w
MD B Manager MIB
Managed objects
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
An NMS can automatically discover a managed object, such as a hub, when added to the
network. The NMS can identify the new object as hub only after the MIB schema of the hub is
compiled into NMS software
Root
.
Lev el 1
m
co
Lev el 2
s.
Lev el 3
bu
la
Designation:
iso 1
org 1.3
dod 1.3.6
internet 1.3.6.1
The circle is syntax. Semantics is definition from dictionary. A plane figure bounded by a
single curved line, every point of which is of equal distance from the center of the figure.
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
it u is o iso-itu
0 1 2
or g
3
dod
6
internet
1
m
co
A ccess: Object T ype:
Access Object ID and
privilege D e s c ri p t o r
s.
circle
bu
Status :
la
Impl ementaion
requirements
Syntax : Defintion :
yl
Notifications :
Notify changes in
attribute values
w
w
Object Class:
Circular
object Behaviour
Operations:
Push
Attributes : Attributes:
circle, dimension ellipse, dimension
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
object ID unique ID
and descriptor and name for the object
syntax used to model the object
access access privilege to a managed object
status implementation requirements
d ef i n i t i o n textual description of the semantics
of object type
o b j e ct cl a s s managed object
attributes attributes visible at its boundary
o p er a t i o n s operations which may be applied to it
b eh a vi o r behavior exhibited by it in response to operation
m
notifications notifications emitted by the object
Packet Counter Example
co
Characteristics
s. Example
bu
Object type P k t Co u n t e r
la
Sy nt ax Co u n t e r
yl
Ac c es s Read-only
lls
Status Mandatory
Description Co u n t s n u m b e r o f p a c k e t s
.a
Characteristics Exa m p l e
w
Object class P a c k e t Co u n t e r
A t t ri b ut es Single-val ued
Operations g et , s et
Beh av i or Retrieves or resets val ues
Notifications Generates notificati ons on new
value
Figure 2.10 (b) OSI Perspective
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
In Internet requests/responses are in OSI operations. In Internet traps and notifications are
in (SNMPv2).
Operations /
Re q u e s t s
Manager Re s p o n s e s Agent
m
co
Figure 2.11 Management Message Communication Model
Transfer Protocols
s.
bu
la
Manager Operations / Requests / Responses Agent
Applications Traps / Notifications Applications
yl
lls
Manager Agent
.a
SNMP (Internet)
C o m m u n i c a ti o n Communication
CMI P ( O S I)
Module Module
w
w
UDP / IP (Internet)
w
Internet is based on SNMP and OSI is based on CMIP. OSI uses CMISE (Common
Management Information Service Element) application with CMIP.
OSI specifies both c-o and connectionless transport protocol; SNMPv2 extended to c-o,
but rarely used.
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
ASN.1 is more than syntax; its a language. It addresses both syntax and semantics. There are
two types of syntax
Abstract syntax: set of rules that specify data type and structure for information storage.
Transfer syntax: set of rules for communicating information between systems.
Makes application layer protocols independent of lower layer protocols. It can generate
machine-readable code for example Basic Encoding Rules (BER) is used in management
modules.
Backus-Nauer Form (BNF)
m
<digit>
Simple Arithmetic Expression entity (<SAE>) is constructed from the primitives
co
<digit> and <op>
s.
bu
Definition:
<name> ::= <definition>
Rules:
la
9 is primitive 9
19 is construct of 1 and 9
w
Assignments values
<BooleanType> ::= BOOLEAN
<BooleanValue> ::= TRUE | FALSE
ASN.1 module is a group of assignments
person-name Person-Name :: =
{ first "John",
middle "I",
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
last "Smith"
}
m
PersonnelRecord ::= SET
{ Name,
co
title GraphicString,
division CHOICE
s.
marketing [0] SEQUENCE
{Sector,
Country},
bu
research [1] CH O IC E
{product - based [0] NULL,
la
basic [1] NULL},
production [2] SEQUENCE
yl
{Product - line ,
Country } }
lls
etc.
.a
Example 1
w
ASN.1 Symbols
w
Sy m b o l Meaning
w
::= Defined as
| or, alternative, options of a list
- Signed number
-- Following the symbol are comments
{} Start and end of a list
[] Start and end of a tag
() Start and end of subtype
.. R an g e
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Derived from another type; given a new ID In Fig, INTEGER is either universal or
m
application specific
Other types:
co
CHOICE, ANY
s.
BookPages ::= SEQUENCE OF { BookPageNumber}
or
bu
B o o k Pag es : : = SE Q U E N C E O F
{SEQUENCE
la
{ChapterNumber, Separator, PageNumber}
}
yl
lls
Data Type
.a
Tag
Structure
w
w
w
Number
Context-
Universal Application Private
specific
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
2.7Functional Model
OSI
Functional Model
The configuration management will set and change network configuration and
component parameters. It will set up alarm thresholds
m
Fault management will do detection and isolation of failures in network and trouble ticket
administration
co
Performance management monitors performance of network
Security managementAuthentication, Authorization and Encryption
s.
Accounting management-- Functional accounting of network usage
bu
la
yl
lls
.a
w
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Chapter 3
SNMPv1: Organization and Information Models
Managed LAN
m
NM S
co
192.168.252.110
172.17.252.1
s.
Router 2
bu
Backbone Network
la
yl
Router 1
172.16.4 6.1
lls
Hu b 1 Hu b 2
172.16.46.2 172.16.46. 3
.a
NMS on subnet 192.168.252.1 manages the router and the hubs on subnet 172.16.46.1
across the backbone network .Information obtained querying the hub. Data truly reflects what is
stored in the hub
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Internet Engineering Task Force (IETF)
1990 SNMPv1
co
1995 SNMPv2
1998 SNMPv3
s.
Internet documents:
Request for Comments (RFC)
bu
IETF STD Internet Standard
FYI For your information
la
So u rc e fo r R FC s SNMP
ftp://nic.mil/rfc Management
yl
Documents
ftp://ftp.internic.net/rfc
lls
http://nic/internet.net/
RFC 1065 RFC 1066 RFC 1067
.a
RFC 1158
MIB II
RFC 1213
STD 17
RFC 1442 RFC 1443 RFC 1444 RFC 1448 RFC 1449
SMIv2 Txt SMIv2 SNMPv2 SNMPv2
SMIv2 Protocol Ops Transport Map.
Conventions Conformances
RFC 1902 1905 RFC 1906
RFC 1903 RFC 1904
MIB II for
SNMPv2
RFC 1907
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Organization Model
Relationship between network element,
agent, and manager
Hierarchical architecture
Information Model
Uses ASN.1 syntax
SMI (Structure of Management Information
MIB ( Management Information Base)
Communication Model
Transfer syntax
SN M P o v e r T C P/ IP
Communication services addressed by messages
Security framework community-based model
m
3.4 The Organization Model
co
Two-Tier Organization Model
SNMP
s. SNMP SNMP
bu
Manager Manager Manager
la
SNMPAgent Network Agent
yl
Network Network
Element Element
lls
(a) One Manager - One Agent Model (b) Multiple Managers - One Agent Model
.a
w
SN MP
Manager
RMON
Probe
Managed
Objects
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
GetNext-Request GetNext-Request
Get-Request Set-R eG
quete-sRtesponse Get-Request Set-Re
q eGt ue
R-ste s p o ns e
m
Trap Trap
co
s.
S N MP SN M P
bu
UDP UDP
la
IP IP
yl
DL C DLC
lls
PHY P HY
.a
Physical Medium
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Get-Response
Agent responds with data for get and set
requests from the manager
Trap
Alarm generated by an agent
Managed Object
Object
Object Object
Type Instance
m
Name:
co
Syntax: Encoding:
OBJECT
ASN.1 BER
IDENTIFIER
s.
bu
Figure 3.4 Managed Object: Type and Instance
la
Object type and data type are synonymous
Object identifier is data type, not instance
yl
lls
Object
w
Object Object
w
Typ e Instance 3
w
Object
Instance 2
Name:
Syntax: Encoding: Object
O B JE CT
ASN.1 BER Instance 1
IDENTIFIER
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
N a me
Uniquely defined by
DESCRIPTOR AND
OBJECT IDENTIFIER
Internet Subnodes
m
Internet
co
{1 3 6 1}
s.
bu
directory mgmt experimental private
la
(1) (2) (3) (4)
yl
lls
private
(4)
ent er pr i s es
(1)
cisco hp 3 Co m Cabletron
(9) (11) ( 4 3) ( 52)
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
SNMP ASN.1
Data Type
Tag
Structure
Number
Class
Context-
Universal Application Private
specific
m
co
Figure 3.7 SNMP ASN.1 Data Type
s.
Primitive Data Types bu
S t ru c t u r e Data Type Comments
Primitive types INTEGER Subtype INTEGER (n1..nN)
la
Special case: Enumerated
INTEGER type
yl
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Defined data types are simple or base types
co
Opaque is used to create data types based on
previously defined data types
max 2^32 -1
G a ug e Capped, non-negative integer,
.a
increase or decrease
TimeTicks Non-negative integer in
w
S T RI NG
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Type Length Value
co
s.
Class P/C Tag Number
bu
(7-8th bits) (6th bit) (1-5th bits)
la
Type Tag
lls
IpAddress APPLICATION 0
Counter APPLICATION 1
w
Gauge APPLICATION 2
TimeTicks APPLICATION 3
w
Opaque APPLICATION 4
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
END
m
sysDescr OBJECT-TYPE
SYNTAX DisplayString (SIZE (0..255))
co
ACCESS read-only
ST A T U S m a n d at o ry
s.
DESCRIPTION
A textual description of the entit y. This value should include the full name and
bu
version identification of the systems hardware type, software operating-system,
and networking software. It is mandatory that this only contain printable ASCII
la
ch a ra ct e rs .
::= {system 1 }
yl
lls
[RFC 1213]
Aggregate Object
w
A group of objects
w
Columns of objects
Rows of instances
Example: IP address table
Consists of objects:
IP address
Interface
Subnet mask (which subnet this address
belongs to)
Broadcast address (value of l.s.b. in IP
broadcast address)
Largest IP datagram that can be assembled
Multiple instances of these objects associated with
the node
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
ipAddrTable OBJECT-TYPE
SYNTAX SEQUENCE OF IpAddrEntry
ACCESS not-accessible
STATUS mandatory
DESCRIPTION
ipAddrTable OBJECT-TYPE
::= {ip 20}
ipAddrEntry OBJECT-TYPE
m
::= {ipAddrTable 1}
co
Aggregate M.O. Macro: Entry Object
s.
ipAddrEntry OBJECT-TYPE
bu
SYNTAX IpAddrEntry
ACCESS not-accessible
STATUS mandatory
la
DESCRIPTION
yl
INDEX { ipAdEntAddr }
.a
::= { ipAddrTable 1 }
w
IpAddrEntry ::=
SEQUENCE {
w
ipAdEntAddr
w
IpAddress,
ipAdEntIfIndex
INTEGER,
ipAdEntNetMask
IpAddress,
ipAdEntBcastAddr
INTEGER,
ipAdEntReasmMaxSize
INTEGER (0..65535)
Index ipAdEntAddr uniquely identifies an instance. May require more than one object in the
instance to uniquely identify it
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
ipAdEntAddr OBJECT-TYPE
SYNTAX IpAddress
ACCESS read-onl y
STATUS mandatory
DESCRIPTION
m
STATUS mandatory
DESCRIPTION
co
"The size of the largest IP datagram which this
entity can re-assemble from incoming IP
fragmented datagrams received on this interface."
s.
::= { ipAddrEntry 5 }
bu
Tabular Representation of Aggregate Object
la
yl
TABLE
T
lls
ENTRY
E
.a
w
The objects TABLE T and ENTRY E are objects that are logical objects. They define the
grouping and are not accessible. Columnar objects are objects that represent the attributes
and hence are accessible. Each instance of E is a row of columnar objects 1 through 5.
Multiple instances of E are represented by multiple rows.
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
mib-2
(1)
m
ip (4) egp (8)
icmp (5) udp (7)
co
tcp (6)
s.
bu
Figure 4.26 Internet MIB-II Group
System Group
syst e m
(mib-2 1)
s y s D es c r ( 1) sysServices (7)
s y s O bj ec t I d
s y s Loc at i on ( 6)
(2)
sysUpTime (3) sysName (5)
sysContact (4)
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
sysServices
sysServices OBJECT-TYPE
SYNTAX INTEGER (0..127)
ACCESS read-only
STATUS mandatory
DESCRIPTION
"A value which indicates the set of services that this entity primarily offers.The value is a
sum. This sum initially takes the value zero, Then, for each layer, L, in the range1 through 7,
that this node performs transactions for, 2 raised to (L - 1) is added to the sum. For example, a
node which performs primarily routing functions would have a value of 4 (2^(3-1)). In
contrast, a node which is a host offering application services would have a value of 72
(2^(4-1) + 2^(7-1)). Note that in the context of the Internet suite of protocols, values should b
calculated accordingly:
m
layer functionality
1 p h y s i c a l ( e . g . , r e p e a t er s )
co
2 datalink/subnetwork (e.g., bridges)
3 internet (e.g., IP gateways)
s.
4 end-to-end (e.g., IP hosts)
7 applications (e.g., mail relays)
bu
For systems including OSI protocols, layers 5 and 6 may also be counted." :: = { system 7 }
la
Interfaces Group
yl
lls
interfaces
(mib-2 2)
.a
w
i f Num ber i f T a bl e
(1) ( 2)
w
ifEntry
w
(1)
Le g en d: I N DE X i n b o l d
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
IP Group
ip
(mib-2 4)
m
ipOutRequests(10) ipReasmReqds (14)
i p O u t D i s c a r ds ( 1 1 ) ipReasmTimeout (13)
co
ipOutNoRoutes (12)
s.
Figure 3.10 IP Group
bu
la
ipForwarding: Gateway(1) and Router(2)
IP Address Table contains table of IP addresses
yl
ipNetToMediaTable
(ip 22)
w
ipNetToMediaEntry (1)
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
co
Figure 3.12 ICMP Gro up
s.
Objects associated with ping
icmpOutEchos # ICMP echo messages sent
bu
icmpInEchoReps # ICMP echo reply messages
re c ei v ed
la
Objects associated with traceroute/tracert
icmpInTimeExcs # ICMP time exceeded messages received
yl
lls
TC P G ro up
.a
tc p
(mib-2 6)
w
w
tcpRtoMin (2)
tcpConnTable 13)
tcpRtoM ax (3)
tcpRetranSegs (12)
tcpM axConn (4)
tcpActiveO pens (5) tcpOutSegs (11)
tcpP assiveO pens (6) tcpInS egs (10)
tcpAttem ptFails (7) tcpCurrEstab (9)
tcpEstabResets (8)
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
tcpConnTable
(tcp 13)
co
t c p Co n n E n t r y
s.
( 1)
bu
tcpConnState (1) tcpCommRemPort (5)
tcpConnLocalAddress (2) tcpConnRemAddress(4)
la
tcpConnLocalPort (3)
yl
lls
UDP Group
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
udp
(mib-2 7)
udpEntry
(1)
udpLocAddress udpLocalPort
(1) (2)
m
Figure 3.15 UDP Group
co
s.
3.7 SNMPv1: Communication Model
SNMP Architecture
bu
SN M P M a n a g e r SNMP Agent
la
yl
M an ag e- StNNMPt-R
Meaqnuaegsetr SN M P A g e nt
Ge ex GetN ext- Request
m ent Application Application
e
lls
Dat a
Get-Request Set-ReqeuGstt-Response Get-Request Set-Reque Gset t-Respo nse
Trap
.a
Trap
w
w
w
S N MP S N MP
UDP UDP
IP IP
DL C DL C
PHY P HY
Physical Medium
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
It is truly simple network management protocol . Five messages, three from manager and two
fro m ag en t
SNMP Messages
Get-Request
Get-Next-Request
Set-Request
Get-Response
Trap
Generic trap
Sp e ci fi c t rap
Time stamp
Generic trap
coldStart
warmStart
linkDown
m
linkUp
authenticationfailure
co
egpNeighborLoss
enterpriseSpecific
s.
Sp e ci fi c t rap
for special measurements such as statistics
bu
Time stamp: Time since last initialization
la
elements
w
- C o m m u n i c at i o n p ro c e s s e s (P D U h a n d l e r s )
- Peer processes that support application entities
Authentic Messages
Authentication Sche me
SNMP Agent
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
SNMP Agent
READ- READ-
SNMP Access Mode
O N LY W RIT E
m
not-accessible read-only write-only read-write MIB Acc ess
co
Object 1 Object 2 Object 3 Object 4
SNMP MIB View
s.
Figure 3.18 SNMP Com munit y Profile
bu
MIB view
la
An agent is programmed to view only a subset of managed objects of a network
el e m en t
yl
Access mode
lls
Operations on an object determined by community. Profile and the access mode of the
object
w
SNMP community paired with SNMP. community profile is SNMP access policy
Pa ram et e rs :
Community / communities Manager
Agent / Agents
Manager / managers
Community
Community Profile 1
Agent 1
Community Profile 2 Agent 2
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Access Policy
Manager manages Community 1 and 2 network .Components via Agents 1 and 2. Agent 1
has only view of Community Profile 1, e.g. Cisco components. Agent 2 has only view of
Community Profile 2, e.g. 3Com components. Manager has total view of both Cisco and 3
components.
Generalized Administration Model
M an ag er 1
( Com m uni t y 1)
Com munity 1
m
co
M an ag er 3
( Com m uni t y 1, C om m u ni t y 2)
s.
Com munity 2
F i g u re 3. 1 9 S N M P A c ce s s P o l i c y
.a
communities . 1 and 2
w
SNMP Manag er
(Community 1)
SNMP
Proxy Agent
Agent
non-SNMP
SNMP Community
Community
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Proxy agent enables non-SNMP community. The elements are managed by an SNMP manager.
An SNMP MIB is created to handle the non-SNMP objects.
SNMP Dat a
PDU
Application Application Versi on Comm unity S NM P P D U
PDU Header
Transport UDP
PDU Header Application PDU
Network IP
Transport PDU
PDU Header
Data Link DLC
m
Network PDU
PDU Header
co
Figure 3.20 Encapsulated SNMP Message
Protocol entities support application entities
s.
Communication between remote peer processes
Message consists of
bu
Version identifier
Community name
la
Protocol Data Unit
Message encapsulated and transmitted
yl
lls
RequestID ...
Ty p e Status Index name value name va l u e
w
PDUs ::=
w
CHOICE {
get-request Figure 5.8 GGeteatnd
ReSet
queTsytp-PeDPDU,
Us
w
get-next-request GetNextRequest-PDU,
get-response GetResponse-PDU,
set-request SetRequest-PDU,
trap Trap-PDU
}
PDU Types: enumerated INTEGER
get-request [0]
get-next-request [1]
s et -req u es t [2 ]
get-response [3]
trap [4]
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Error in Response
ErrorStatus ::=
INTEGER {
noError(0)
tooBig(1)
noSuchName(2)
bad value(3)
readOnly(4)
genErr(5)
}
Error Index: No. of VarBind that the first error occurred
Tra p P D U
m
PDU Agent Generic Specific VarBind 1 VarBind 1 VarBind n VarBind n
Ente Timestamp ...
Ty p e Address Trap Type Trap Type name value name value
rprise
co
Generic T rap Type Description (brief)
s.
coldStart(0) Sending protocol entity is reinitializing itself;
agent's confi gurati on or protocol entity
bu
impl ementati on may be altered
warmStart(1) Sending protocol entity is reinitializing itself;
agent configuration or protocol enti ty
implementati on not altered
la
Enterprise and agent address pertain to the system generating the trap. Seven generic
traps specified by enumerated INTEGER. Specific trap is a trap not covered by enterprise
w
specific trap time stamp indicates elapsed time since last re- initialization.
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
A B T Z
1. 1 2. 1 3. 1
1. 2 2. 2 3. 2
m
Figure 3.21 MIB for Operation Sequences
co
s.
bu
A More Complex MIB Example
la
yl
lls
1 2 3 9
.a
w
w
1 2 2 10 4 21
w
5 18 6 9
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Get-Next-Request Operation
Manager Agent
Process Process
GetNextRequest (sysUpTime,
atPhysAddress)
GetNextRequest (sysUpTime,
atPhysAddress.13.172.16.46.1) atIfIndex atPhysAddressatNetAddress
23 0000000C3920B4192.168.3.1
m
13 0000000C3920AC172.16.46.1
16 0000000C3920AF172.16.49.1
co
GetResponse( (sysUpTime.0 = "315131800"),
(atPhysAddress.16.172.16.49.1 = "0000000C3920AF") )
s.
GetNextRequest (sysUpTime,
bu
atPhysAddress.16.172.16.49.1)
la
GetResponse( (sysUpTime.0 = "315131805"),
(atPhysAddress.23.192.168.3.1 = "0000000C3920B4") )
yl
lls
GetNextRequest (sysUpTime,
atPhysAddress.23.192.168.3.1)
.a
(ipForwarding.0 = "1") )
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Chapter 4
SNMP Management -- RMON
RMON Components
L AN
m
co
RMON Probe Data gatherer is a physical device. Data analyzer is a processor that
analyzes data. RMON Remote Network Monitoring
s.
4.1 Remote Monitoring bu
R e m o t e F D DI L A N
la
yl
F D DI
.a
Backbone Network
Router Bridge
w
Loc al LA N
w
Router
w
NM S Ethernet
Remot e Token Ring LA N Probe
Token Ring
Probe
The RMON is embedded monitoring remote FDDI LAN. Analysis done in NMS
RMON Benefits
Monitors and analyzes locally and relays data;
Less load on the network
Needs no direct visibility by NMS;
More reliable information
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
r m onC o nf or m a nc e ( 20)
statistics (1) probeConfig (19)
hi s t or y ( 2) usrHistory (18)
alarm (3) a1M atrix (17)
a1 Hos t ( 16)
m
hos t ( 4)
hos t T o p N ( 5) n1M atrix (15)
matrix (6) n1 Hos t ( 14)
co
filter (7) addressMap (13)
c apt ur e ( 8) protocolDist (12)
ev ent ( 9) protocolDir (11)
s.
T ok e n Ri ng ( 10)
RM O N 1 RM O N 2
bu
RM O N 1 E x t ens i on
la
Figure 4.2 RMON Group
yl
4.3 RMON1
w
w
State E n u me - Description
ration
valid 1 Row exists and is active. It is fully configured and operational
createRequest 2 Create a new row by creating this object
underCreation 3 Row is not fully active
invalid 4 Delete the row by disassociating the mapping of this entry
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
T o k e n Ri n g S t a ti s ti c s
T o k e n Ri n g T o k e n Ri n g History
Statistics History Control
Ethernet Statistics
Ethernet Ethernet History
Statistics History Control
F i l te r G r o u p
Packet Channel Packet
m
Filtering Filtering Capture
co
Alarm Event
Generation Generation
s.
Figure 4.3 RMON1 Groups and F u nct ion s
bu
Probe gathers data. Its functions are
Statistics on Ethernet, token ring, and
la
hosts / conversations
Filter group filters data prior to capture of data
yl
RMON1 MIB Groups & Tables
.a
Textual Convention:
LastCreateTime and TimeFilter
LastCreateTime tracks change of data with the
changes in control in the control tables
Timefilter used to download only those rows that
c h a n g e d a f t e r a p a rt i c u l a r t i m e
FooTable (bold indicating the indices):
fo o T i m eM a r k fo o I n d e x fooCounts
fo o Co u n t s .0.1 5
fooCounts. 0.2 9
fooCounts. 1.1 5
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
fooCounts. 1.2 9
fooCounts. 2.1 5
fooCounts. 1.2 9
fooCounts. 3.1 5
fooCounts. 3.2 9
fooCounts. 4.2 9 -- (Note that row #1 does not exist for times 4 & 5
since the last update occurred at time-mark 3.)
fooCounts. 5.2 9 (Both rows #1 and #2 do not exist for time-mark greater
than 5.)Bold objects (fooTimeMark and fooIndex) are indices
m
Group OID Function Tables
Statistics rmon 1 Link level statistics -etherStatsTable
co
-etherStats2Table
History r mo n 2 Periodic statistical data -historyControlTable
s.
collection and storage for later -etherHistoryTable
retrieval -historyControl2Table
bu
-etherHistory2Table
Alarm rm o n 3 Generates events when the data -alarmTable
la
sample gathered crosses pre-
e s t a b li s h e d t h r e s h o l d s
yl
-hostTimeTable
-hostControl2Table
.a
t h e re s p e c t i v e c a t e g o ri e s o f
statistics gathered
w
of hosts -matrixSDTable
-matrixDSTable
-matrixControl2Table
Filter rm o n 7 Filter function that enables -filterTable
c a pt u re of d es i re d p ar am et e rs -channelTable
-filter2Table
-channel2Table
Packet rm o n 8 Packet capture capability to -buffercontrolTable
Ca p t u r e gather packets after they flow -captureBufferTable
through a channel
Event rm o n 9 Controls the generation of -e v e n t T ab l e
events and notifications
Token rm o n 1 0 See T abl e 8. 3 See Table 8.3
Ring
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
dataT able
dataEntr y
controlT able
m
In d e x DataS ource T ableSize O w ner Status Other
co
In d e x AddlIndex Other
s.
Note on Indices:
Indices marked in bold letter
bu
Value of dataIndex same as value of controlIndex
la
Figure 4.4 Relationship between Control and Data Tables
yl
lls
Control table used to set the instances of data rows in the data table. Values of data index and
control index are the same. MatrixSDTable is the source-destination table. ControlDataSource
.a
identifies the source of the data. ControlTableSize identifies entries associated with the data
w
Filter Group
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
filterTable
filterEntry
channelTable
filter
m
filterIndex Filter
ChannelIndex
Other =3 Parameters
channel channel channel channel =2
Channel
Inde x = 2 IfIndex Acc eptType DataControl
co
Parameters
filter
Note on Indices: filterIndex Filter
s.
ChannelIndex
=4 Parameters
Indices marked in bold letter =2
Value of filterChannelIndex same as value of channelIndex
bu
la
yl
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
promiscuous data
Ri n g St at i o n Station statistics ringStationControlTable
co
ringStationTable
ringStationControl2Table
s.
Ring Station Order Order of the stations ringStationOrderTable
Ring Station Configuration Active configuration ringStationConfigControlTable
bu
of ring stations ringStationConfigTable
So u rc e Ro u t i n g Utilization statistics sourceRoutingStatsTable
la
of source routing sourceRoutingStats2Table
information
yl
4.7 RMON2
w
ATM RMON
ATM Forum extended RMON to ATM. Switch extensions and ATM RMON defines objects
at the base layer. ATM protocol IDs for RMON2 defines additional objects at the higher levels.
ATM devices require cell-based measurements and statistics. Probe should be able to handle
high speed .
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Application
Layer
Et h e r n e t T o k e n Ri n g Switch
'Base' Layer AT M
RMON RMON Ex t e n s i o n s
RMON
( RF C 1 7 5 7 ) ( RF C 1 5 1 3 ) f o r RM O N
m
Figure 4.5 RMON MIB Framework (1995 ATM Forum)
co
ATM Probe Location
s.
bu
A TM
A TM
Switch
la
Switch
yl
RMON
RMON Probe
lls
Probe
.a
(a) External Probe with copy (b) Internal Probe with copy
w
w
ATM Switch A TM A TM
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
co
s.
bu
la
yl
lls
.a
w
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Chapter 5
Broadband Network Management
Corporate or enterprise
S e r v i c e p ro v i d e r s
Residence or SOHO
m
Cable Modem DS L
Ca bl e HF C T el eph on e xDSL
co
Cus t o m er Cus t o m er
Modem Net wor k Lo op Modem
Net wor k Net wor k
s.
Cable Cent r al
M od e m Office
Head End
bu
E q u i pm e n t
S DH / S O NE T
WA N
la
Ro ut er /
A T M S wi t c h Satellite Communication
yl
W i r el es s
O C- n / W i r el es s
Business Ro ut er / Cus t o m er
.a
DSL
Wi r e l e s s
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Fixed wireless
Satellite communication
Access Technologies
Br o a d b a n d
Ac c e s s
Technology
HF C Sa t e l l i t e
x D SL Wireless
Communication
m
co
One- Tw o-
Way Way
s.
Figure 5.2 Broadband Access Technologies
bu
Hybrid fiber coaxial technology plant / cable modem at customer premises
la
yl
direction) telephone
.a
Carries voice, video and data. Upstream bandwidth requirements less compared to downstream
bandwidth. xDSL: Digital subscriber line technology
w
Uses existing local loop telephone facilities.Wireless: Terrestrial fixed wireless systems
Instructional scientific and medical (ISM): 902 - 928 MHz (0.5 mile) and 2400 - 2483 MHz
(15 miles). Multichannel multipoint distribution service (MMDS) 2500 - 2686 MHz (35 miles).
Local multipoint distribution service 27,500 - 28,350 MHz and 31,000 - 31,300 MHz (3 miles).
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
2-way amplifiers
Ethernet
m
Cable
Modem
co
NIU
s.
Satellite
bu 2-WAY
Head Fiber COAX
W AN Fiber
End Node
Amplifier
la
ISP NIU
yl
lls
Cable
Modem
NIU Network Interface Unit
.a
TV Monitor
w
Workstation
Head end:
w
w
Network interface device (NID) / unit (NIU). Demarcation point between customer
network and service provider networks
B ro ad b an d L A N
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Broadband LAN
Downstream Signal
50 - 860 M H z Termination
m
Figure 5.3 Broadband L AN
co
s.
Digital-to-Analog Encoding bu
Di g i t a l Modulated analog
Digital
Modem Modem
la
carrier
1 1
yl
0 0
time frequency time
lls
Ch a n n e l
b a n d wi d t h
.a
bit rate
w
s y m b o l rat e
number of levels n = 2k
bit rate = symbol rate x k
Amplitude shift keying
Frequency shift keying
Phase shift keying
Quadrature phase shift keying
Four levels ( 00, 01. 10, 11)
Relatively insensitive to noise
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Data over cable service specifications (DOCSIS) for cable modem ensures
m
interoperability
co
One-way cable modem uses telco-return
s.
Up s t r e a m Do w n s t r e a m
Toshiba 2 . 5 6 Ms y m/ s e c 5.36 Msym/sec
bu
R CA D C M 1 0 5 1 0 Mb p s 38 M b ps
Cisco 1 0 Mb p s 38 M b ps
la
LANcity 1 0 Mb p s 10 M b ps
Motorola 1 0 Mb p s 40 M b ps
yl
lls
Termination System
w
Multiple fiber pairs run from head end to fiber node; each pair carries 2 one-way signals
Head end converts all (telephony, digital video, data, and analog video) signals to
optical carrier to transmit on the fiber.
Houses are connected from fiber node via coaxial cables
Coaxial cable are in tree topology and carries 2-way signal
Amplifiers on the coaxial cable have 2-way amplifiers that amplify the signals in both
directions
Drop from coaxial cable to NID (also called NIU) - called Tap-to-TV in CATV
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
R F S pect ru m
Downstream (Forward)
Upstream G u a rd 5 4 - 7 5 0 M Hz
(R ev e rs e ) B and Anal og Digital Digital
5-42 MHz 42-54 MHz T el epho ny
Video Data Services Video
700-750 MHz
54-550 MHz 5 5 0 - 5 6 0 M Hz 5 6 0 - 7 0 0 M Hz
m
Upstream (Reverse)
5-42 MHz
co
Digital Digital
Telephony
s.
Video Control D a t a S erv i c es
2 5 - 4 0 M Hz
6-8 MHz 1 0 - 2 5 M Hz
bu
la
Tel co Return
DOCS Reference Architecture
4
.a
Video
w
INTERFACES:
1 CMCI Cable Modem to CPE Interface
2 CMTS-NSI CMTS Network Si de Interface
3 DOCS-OSSI Data Over Cable Servi ces Operatio ns Support System Interface
4 CMTRI Cable Modem to Tel co Return Interface
5 DOCSS Data Over Cabl e Security System
6 RFI Cable Modem to RF Interface
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
The architecture shows two-way (HFC link) and one-way (HFC link & telco return).
CMTS Components
Video
m
Operations Support System/ Security & Access
3 5
Element Manager Controller
co
s.
Switch / router routes the traffic between cable modems and to the external network. It
interfaces to CMTS via the terminator (term). Modulator (mod) and demodulator demod)
bu
transform digital data from and to analog format. Combiner and splitter and filter perform the
complimentary functions of muxing and demuxing. Transmitter converts the RF signals to
la
optical carrier; receiver down-converts the optical signal. Servers handle the applications and
yl
databases. Security is managed by the security and access controller. OSS and element manager
perform network and service management.
lls
DOCS Interfaces
.a
w
w
Telco Return
4
w
Video
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Multimedia service. It has RF spectrum management. Service and business management is
co
important for MSOs and customer. Shared media impacts security and bandwidth. Security
and privacy of home network
s.
HFC Protocol Architecture
bu
Head End Ca b l e M o d e m
la
Ap p l i c a t i o n s , Modem Applications
yl
Ap p l i c a t i o n s
SNMP Manager SNMP Agent
lls
SN M P, F T P, SN M P, F T P,
SN M P
HT T P , E T C HTTP, ETC
.a
T C P / UD P T C P / U DP T C P / UD P
w
IP IP IP
w
ATM HF C HF C Et h e r n e t Ethernet
SO N ET
Li nk Li nk Li nk Li nk Li nk
w
C ab l e m o d e m s h av e SN M P ag en t s
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
CM Management MIBs
mib-2
(internet.2.1)
i f MI B ( 3 1 )
m
docsIfMib (127) docsTrCmMIB (128)
co
Figure 5.7 Cable Modem Management MIBs
s.
bu
la
yl
Standard MIBs:
.a
s y s t e m , i n t e rfa c es , i fM I B
w
docsDevMIB
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
docsIfMIB
(127)
m
docsIfCmObjects (2)
docsBpiMIBObjects docsBpiConformance
co
(1) (3)
docsBpiNotification
s.
bu (2)
docsQosMIBObjects
(6)
la
RF MAC Interface
w
Network Layer
w
w
RF MAC Layer
Downstream1 Upstream1 U p s t r e a m2
RF Physical Layer
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Group with objects
needed for cable device
co
system management
docsDevNmAccessTable docsDevMIBObjects 2 Defines the minimum
s.
level of SNMP access
security
bu
docsDevSoftware docsDevMIBObjects 3 Provides information for
network-downloadable
la
software upgrades
docsDevServer docsDevMIBObjects 4 Provides information
yl
reporting
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Window
(M o d e m v o l t a g e )
Smooth
(C o n n e c t o r l o s s )
Sharp
(Signal/Noise)
m
co
Event Index
s.
HFC Link Management bu
Signal strength critical
RF Spectrum Management
.a
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
DSL Limitations
m
co
B roa db a n d ADSL
ATU-C Splitter Splitter ATU-R
Ne t w o r k Loop
Voi c e
s.
bu
Voice
FDM
Upstream Downstream
POTS
4 KHz 25 KHz 200 KHz 1.1 MHz
Frequency
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Rate adaptive
m
Maximum loop variation coverage
co
Standard and hence interoperability
s.
ADSL Forum bu
TR-001 A DS L F o r u m S y s t e m R e f e r e n c e M o d e l
la
TR-005 A DS L N e t w o r k E l e m e n t M a n a g e m e n t S y s t e m
TR-006 SNMP-based ADSL LINE MIB; see also draft-
yl
ietf-adslmib-adsllinemib-09.txt
lls
achieve interoperability
accelerate implementation
s e c u ri t y
m an ag e m en t
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
VDSL Network
Optical
Central Twisted Home
Fiber Network VDSL
Office VDSL Pair Network
Unit
m
premises on multiple twisted pairs. Shorter distance of twisted pairs permission of higher data
co
rate - 55.2 Mbps downstream and 2.3 Mbps upstream
ADSL Network
s.
Private Public Premises
Network
bu Network Network
A D S L A c c e s s N e tw o rk
OS OS
la
SM TE (s)
Service Broadband Settop TV
Systems Network
yl
Packet
ATM STM
ATM Packet
w
ATM
Tran s po r t M o des
w
Transport Modes
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
ATM / STM
ATM / Packet
End-to-end ATM
Interfaces
m
V interface
co
VC interface between acces s node and
external network and interfaces
U interfaces - o ff the splitters; Will be eliminated with
s.
ADSL-Lite
bu
POTS interfaces - low pass filter interfaces for POTS
T and B are customer premises network interfaces
T between PDN and service modules
la
Seven AS downstream ch an n el s
- multiples (1-, 2-, 3- or 4-) T1 rate of 1.536 Mbps
w
B u f f e ri n g s c h e m e
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
U-C2
Se r v i c e
U-R2
Module
Hi g h High
Pa s s Pa s s
Filter Filter
Loop
PS T N PS T N
L ow U-CU-R Lo w Telephone Set
Pa s s Pa s s POTS or
m
Fi l t er Filter Voice-Band Modem
co
Splitter-C Splitter-R
s.
Interfaces:
T-R Interface between ATU-R and Switching layers
bu
T/S Interface between ADSL Network Termination and customer installation or home network
U-C Interface between Loop and ATU-C (analog)
UC2 Interface between POTS splitter and ATU-C
la
U-R Interface between Loop and ATU-R (analog)
U-R2 Interface between POTS splitter and ATU-R
yl
V-C Logical interface between ATU-C and a digital network element such as one or more switching systems
lls
.a
Management Elements
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Physical channel
Fa s t ch an n el
Interleaved channel
DMT
m
CAP
co
Signal Power and Data Rate Mgmt
s.
bu
Reduce power
la
Data rat e: In c re as e or d e c re as e b as ed on
threshold margins
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Upshift noise margin A T U- C/ R Phy Threshold for modem incr eases
d at a r at e
Min. ti me interval for upshift A T U- C/ R Phy Ti me i nterval to upshi ft
co
rate adaptati on
Downshift noi se margin A T U- C/ R Phy Threshold for modem
decreases data rate
s.
Min. time interval for downshift A T U- C/ R Phy Ti me i nterval to downshift
rate adaptati on
bu
Desired max. rate A T U- C / R F/I Max rates for ATU-C/R
Desired min. rate A T U- C/ R F/I Min. rates for ATU-C/R
Rate adaptati on ratio A T U- C/ R Phy Di stri buti on ratio between fast
la
and i nterl eaved channels for
avail able excess bit r ate
yl
Fault Management
Parameter Component Line Description
ADSL Line status ADSL Line Phy Indicates operational and
various types of failures of
the link
Alarms thresholds ATU-C/R P hy Generates alarms on failures
or crossing of thresholds
Unable to initialize ATU-R ATU-C/R P hy Initialization fail ure of ATU-R
from ATU-C
R a te c h a n g e ATU-C/R P hy Event generati on when rate
changes when crossi ng of
shift margins in both
upstream and downstream
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Performance Management
P a ra m e t e r Co m p o n e n t Line Descripti on
m
Line attenuation A T U- C / R Phy Measured power loss in dB
from transmitter to receiver
co
AT U
Noise margin A T U- C / R Phy Noise margin in dB of the
s.
ATU with respect to received
signal
bu
Total output power A T U- C / R Phy Total output power from the
modem
la
Max. attainable rate A T U- C / R Phy Max. currently attai nable
dat a r at e by t h e m o de m
yl
check is done
w
A DS L S N M P M I B
Su b -l ay e rs handled by ifMIB
ifStackTable {ifMib.ifMIBObjects 2} (RFC 1573)
P ro p o s e ifTypes
adslPhysIf ::= {transmission 94}
adslInterIf ::= {transmission 124}
adslFastIf ::= {transmission 125}
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
adslF orum
(1.3.6.1.4.1.xx)
adslMIB
(1 )
adslLineMib
(1 )
adslMibObjects(1)
adslLineT able ( 1)
m
adslAtucPhysT able (2) adslLineAlarmConfProfileT able(15
adslAturPh ysTable (3) adslLineConfProfileT able(14) )
adslAtucCha nT able (4) adslAturC hanInterv alTable (13)
co
adslAturC hanT able (5) adslAtucChanIntervalT able(12)
adslAtucPerfDataT able (6) adslAturC hanP erfDataT able (11)
adslAturPerfDataT able (7) adslAtucChanP erfD ataT able (10)
s.
adslAtucIntervalT able (8) adslAturIntervalT able (9)
bu
adslLCSMi b (16)
la
Proposed IF Types
Higher Layer IF Higher Layer IF
w
Physical Line IF
(ATU-C & ATU-R)
ifType = ADSL (94)
ifIndex = i
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Enable (default: Enable) (default: Enable) (default: Enable)
ifConnectPresent True False False
co
ifHighSpeed NU L L N UL L NULL
s.
bu
ADSL Profiles Management
la
yl
Configuration profile
lls
P e r f o r m a n c e p r o fi l e
.a
Alarm profile
w
Traps
w
Generic
w
Loss of frame
Loss of signal
Loss of power
Error-second threshold
Data rate change
Loss of link
ATU-C initialization failure
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Configuration
ADSL-Line i f I ndex i f T abl e profileIndex
Profile Table
1 Profile-1
1 i1 ADSL Line Entry
2 Profile-2
j1 Interleav ed Chan
j2 Interleav ed Chan
m
co
x ix ADSL Line Entry
jx Interleav ed Chan
kx
Fast Chan Entry
s.
bu
Figure 5.14 Use of Profiles in MODE-I (Dynamic)
i1
1 i1 ADSL Line Entry Profile-i1
.a
j1 Interleaved Cha n
k1 Fast Ch an E ntry
w
w
2 i2 i2
ADSL Line Entry Profile-i2
w
j2 Interleaved Cha n
k2
Fast Ch an E ntry
x ix ix
ADSL Line Entry Pro file-in
jx
Interleaved Cha n
kx
Fast Ch an E ntry
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Chapter 6
Service
Management
Network System
m
Management Management
co
Element Resource
Management Management
s.
bu
Network System
Elements Resources
la
Networked Information Systems
yl
lls
T M N a rch i t e ct u re ex p an d e d t o i n cl u d e s y s t e m s m an ag e m en t
w
Management Applications
w
OSI Model
Configuration
Fau l t
Pe rfo r m an c e
S e c u ri t y
Accounting
R e p o rt s
Policy-based management
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Network Provisioning
Inventory Management
Equipment
Facilities
Network Topology
Database Considerations
Circuit Provisioning
m
Network Provisioning is provisioning of network resources such as design,
installation and maintenance. It is Circuit-switched network. Packet-switched network,
co
configuration for Protocol , Performance, QoS .
s.
ATM networks bu
Examples:
la
TIRKS (Trunk In t eg rat ed R e co rd Keeping
System) for circuit-switched networks
yl
lls
Network Topology
w
Mapping of network is by Layout, Layering. The Views are Physical and Logical.
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Hu b 1
Port A
A1
S egm ent A
A2
Router
Port B
Segment B B1
Hu b 2
B2
Figure 13.2 LAN P hysical Configuration
A1 A2
Segment A / H ub 1
m
Router
Segment B / H ub 2
co
B1 B2
s.
Figure 6.2 Logical Configur ation of T wo LAN Segm ents
bu
Virtual LAN Configuration
la
yl
lls
Hu b 1
.a
Segment A
A1
w
Segment B B1
w
Port A / Segment A
Port A / Segment B Segment A
w
Router
Switch A2
Segment B
Hu b 2
B2
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
A1 (Hub 1) A2 (Hub 2)
Se g m e n t A / H u b 1 & 2
Router
switch
Se g m e n t B / H u b 1 & 2
B1 (Hub 1) B2 (Hub 2)
Physical and logical configurations different. Physical location obtained from System group
m
Fault is a failure of a network component
co
Results in loss of connectivity
s.
Fault management involves: bu
Fault detection
Polling
la
yl
Fault location
.a
Detect all components failed and trace down the tree topology to the source. Fault
isolation by network and SNMP tools. Use artificial intelligence / correlation techniques.
w
Tools
Performance Metrics
Data Monitoring
Problem Isolation
Pe rfo rm an c e St at i s t i cs
Tools:
Protocol analyzers
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
R MO N
M RT G
Performance Metrics
Macro-level
Throughput
Response time
Availability
Reliability
Micro-level
Bandwidth
m
Utilization
Error rate
co
Peak load
Average load
s.
bu
6.4 Traffic Flow Measurement
la
Network Characterization
yl
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
International
Backbones / N atio nal
Regional / Midlevel
Stub / Enterprise
End-Systems / Hosts
m
co
Data Monitoring and Problem Isolation
s.
Data monitoring bu
Normal behavior
Problem isolation
w
Performance Statistics
Traffic statistics
Error statistics
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Used in
QoS tracking
Performance tuning
Validation of SLA
Trend analysis
Facility planning
Functional accounting
6.5Event Correlation Techniques
B a s i c el e m en t s
m
Identify the cause of the problem
Techniques
co
Rule-based reasoning
Model-based reasoning
s.
Case-based reasoning
bu
Codebook correlation model
State transition graph model
Finite state machine model
la
Rule-Based Reasoning
yl
lls
Modify
Create Remove
attributes
new data data
of data
w
elements elements
elements
w
Match Select
Invoke
potential best
action
rules rule
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Knowledge base contains expert knowledge on problem symptoms and actions to be taken
if -> then, condition -> action. Working memory contains topological and
state information of the network; recognizes system going into faulty stat e. Inference engine in
cooperation with knowledge base decides on the action to be taken. Knowledge executes the
action
Rule-Based Reasoning
Ru l e - b as ed p a rad i g m i s an i t e rat i v e p ro c es s
RBR is brittle if no precedence exists
An exponential growth in knowledge base poses
problem in scalability
Problem with instability
i f p a ck et l o s s < 1 0 % al a rm g re en
if packet loss => 10% < 15% alarm yellow
m
if packet loss => 15% alarm red
co
Solution using fuzzy logic
s.
bu
Configuration for RBR Example
la
Ba c k b o n e
Al a r m A
yl
Ro u t e r A
lls
Ro u t e r B Al a r m B
.a
w
w
Hu b C Al a r m C
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Model-Based Reasoning
NMS / Correlator
Backbone
Network
Router
Model
Router
m
Hub1 Hub2 Hub3
Hub1 Hub2 Hub3 Model Model Model
co
Physical Network Equivalent Model
s.
Figure 6.8 Model-Based Reasoning Event Correlator
bu
Object-oriented model
la
Case
w
Library
w
w
Unit of knowledg
RBR rule
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
CBR case
CBR based on the case experienced before;extend to the current situation by adaptation
Parameterized adaptation
Critic-based adaptation
m
Trouble: file_transfer_throughput=F
Additional data: none
co
Resolution: A=f(F), adjust_network_load=A
Resolution status: good
s.
bu
Trouble: file_transfer_throughput=F
Additional data: none
la
Resolution: B=g(F), adjust_network_bandwidth=B
Resolution status: good
yl
lls
Trouble: file_transfer_throughput=F
Additional data: adjust_network_load=no
.a
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
CBR-Based Critter
Network
Spectrum
Configuration
Management
Fault
Detection
CRITTER
Fault Management
Fault Resolution
Case
Library
m
Application User-based
co
Determinators
Techniques Adaptation
s.
bu User
Configuration Event
Model Model
Correlator Problems
Network Monitors
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Codebook Approach
Two phases:
m
This generates codebook (problem-symptom matrix)
co
2. Correlator compares alarm events with codebook
s.
and identifies the problem. bu
Causality Graph
la
E4 E5 E6 E7
yl
lls
.a
w
E1 E2 E3
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
S1 S2 S3 S4
P1 P2 P3
m
co
Ps are problems and Ss are symptoms
s.
P1 c au s es S1 an d S2 bu
Note d i re ct ed edge from S1 to S2 removed;
S2 is caused directly or indirectly (via S1) by P1
la
Codebook
lls
P1 P2 P3
S1 1 1 0
.a
S2 1 1 1
w
S3 0 1 1
S4 0 0 1
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Correlation Matrix
P1 P2 P3
S1 1 1 0
S3 0 1 1
Correlation Graph
S1 S3
m
co
P1 P2 P3
s.
bu
Figure 6.13 Correlation Graph for
la
yl
9 10
w
5
11
w
8
7
w
3 4
1 2
Causality graph has 11 events - problems and symptoms. Mark all nodes that have onl y
emerging directed edges as problems - Nodes 1, 2, and 11. Other nodes are symptoms.
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
5
11
8
S
7
3 4 S
1 2
P P
m
(b) Pr oblem-Symptom Causality Graph
co
To reduce causality graph to correlation graph:
s.
Symptoms 3, 4, and 5 are cyclical: rep l a c e with
o n e s y mp t o m, s a y 3
bu
S7 and S1 0 are c au s e d by S3 and S5 and
la
h en c e i g n o red
yl
9 3 6
w
1 11 2
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
P1 P2 P11
S3 1 1 1
S6 0 1 0
S9 1 0 1
Codebook Enhancements
m
State Transition Model
Used in Seagates NerveCenter correlation system
co
Integrated in NMS, such as OpenView
Used to determine the status of a node
s.
bu
ping node
la
response ping
yl
lls
receive response
.a
w
NMS / Correlator
Backbone
Network
Router
Physical Network
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
ping hub
response pi ng
r ec ei v e r es p o ns e
No r es p ons e
m
pinged twice
(Ground stat e)
co
No r es p ons e
s.
pinged 3 times
No r es p ons e
bu
Re qu es t
No r es p o ns e
r ec ei v e r es p o ns e
from Router, ping router
la
from router
No action
Res po ns e
yl
from Router
F i g u r e 6 . 1 6 S t at e T r a n s i t i o n G r a p h E x a m p l e
w
Client S er v er
w
Re qu es t
S en d R e qu es t Rec ei v e R eq u es t
M es s ag e
Comm unication
Res p ons e Re qu es t S en d Rec ei v e
Ch an nel
Res po ns e
Rec ei v e R es p ons e S en d R es po ns e
M es s ag e
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Finite state machine model is a passive system; state transition graph model is an active
system. An observer agent is present in each node and reports abnormalities, such as a Web
agent. A central system correlates events reported by the agents. Failure is detected by a node
entering an illegal state
Security threats
Policies and Procedures
Resources to prevent security breaches
Firewalls
Cryptography
Authentication and Authorization
Client/Server authentication system
Message transfer security
m
Network protection security
co
Security Threats
s.
bu
Modification of information
Masquerade
Message stream modification
la
yl
lls
Management Management
Entity A Entity B
.a
w
Disclosure
w
SNMPv3 addressed security threats using USM (user-based security model). USM has two
modules:
Authentication module
P ri v a c y m o d u l e
Data confidentiality
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Message timeliness
M e s s ag e p ro t e ct i o n
m
Formal statement of rules for protecting organizations technology and assets (RFC
co
2196)
s.
Introduction to Firewalls (NIST) bu
Orange Book by National Computer Security Center (NCSC) rates computers based on
security design features
la
Client A
w
F i r e wa l l
Se c u r e d Cl i e n t B
w
Gateway
Ne t w o r k A Rout er
Ne t w o r k B
w
Se r v e r A
Security breach could occur by intercepting the message going from B to A, even if B
has permission to access Network A
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Firewalls
B e n e fi t s
Reduces risks of access to hosts
Controlled access
Eliminates annoyance to the users
Protects privacy (e.g. finger)
Hierarchical implementation of policy and
and technology (e.g. finger)
m
Packet Filtering Firewall
co
Trash
s.
bu
SM T P G at e w ay
Ethernet
la
Packet Filtering
FTP Gateway I nt e rn et
Ro u t e r
yl
S c ree ne d
lls
Secured Network
w
Filtering parameters:
Multistage screening - address and protocol. Works best when rules are simple.
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Secured Secured
Firewall 1 Firewall 2 Internet
Network LAN
Proxy
Services
Application
Gateway
Firewalls 1 and 2 route traffic only from and to the secured LAN
m
Secured LAN is gateway LAN
Behavior of application gateway dependent on the application
co
FTP traffic stored and forwarded after validation
TELNET hosts validated for the session and then direct communication established
s.
Cryptography bu
Secure communication requires
la
Integrity protection: ensuring that the message is not tampered with
yl
S e c u ri t y t h r e a t s
.a
Modification of information
Masquerade
w
Disclosure
Hardware and software solutions
w
Transmission
Channel
Plaintext EncrypStieocnret Key C i p h e rt e x t DecryptiSoencret Key Plaintext
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Caesar cipher: each letter replaced by another letter, which is three letters behind in the
alphabet
Maximum of 26 attempts to decode Caesar cipher
Monoalphabetic cipher: Replace a letter with another randomly chosen; Maximum
attempts to decode 26!
One secret key is needed between each pair
Two standard algorithms for secret key:
m
Principle b as ed on rearranging the blocks several
times based on predetermined algorithm and secret key
co
Public Key Cryptography
s.
bu
Transmission
Ch a n n e l
la
Plaintext En c r y p t i o n Ciphertext Decryption Plaintext
Public Key Private Key
yl
lls
.a
Message Digest
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Digital Signature
Chan nel
Digital Signature
Encryption Signed Ciphert ext Decryption
Signature Validation
m
co
s.
Figure 6.24 Sign ed Public Key Cr yptogra phic Co mmunicati on
bu
la
Principle reverse of public key
Signature created using private key and validated using public key
yl
Digital signature is a message digest generated from plaintext and private key by a
lls
hashing algorithm
Digital signature is concatenated with the plaintext and encrypted using public key
.a
Authentication and Authorization
w
Client/server environment
w
Ticket-granting system
Authentication server system
Cryptographic authentication
Messaging environment
e-mail
e-commerce
Authorization grants access to information
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Ticket-Granting System
Kerberos
Application
Tick et-
Server /
Granting
Service
Server
m
Figure 6.26 Tick et-Granting System
co
Authentication Server
s. A u t h e n t ic a t i o n
bu
User Client Server
Authentication
I nput W o rk s t a t i o n
la
P rox y S e rv er
yl
S e r v ic e
lls
.a
A p p l ic a t i o n
Server / Authentication
w
S erv i c e
w
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
m
Privacy Enhanced Mail
co
Developed by IETF (RFC 1421 - 1424)
s.
End-to-end cryptography bu
Provides
la
Confidentiality
yl
Authentication
lls
ag re ed u p o n m et h o d
MIC-ONLY
ENCRYPTED
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
PEM Processes
MIC
Encrypted DEK
Text
MIC
(a) MIC-CLEAR PEM Process Encrypted DEK
m
Encoded Text
MIC/DEK
co
Encoder
SMTP Format SMTP MIC MIC ONLY e-mail
User Plaintext
Text
(Printable
Conversion Generator PEM System
code)
s.
MIC
bu
Encrypted DEK
(b) MIC-ONLY PEM Process
Encrypted &
Encoded
la
Message
MIC/DEK
yl
Encoder
SMTP Format SMTP MIC Padding & ENCRYPTED e-mail
User Plaintext
Text
(Printable
Conversion Generator Encryption PEM System
lls
code)
Legend:
.a
DEK a random number generated per message basis: used to encrypt the message text
and generate MIC. IK a long-range key agreed upon between the sender receiver used to
encrypt DEK: IK is either public or secret. Public key avoids repudiation.
Signature generation
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
P ubl i c K ey
Signature
Encrypted &
Compressed
m
Message
Encryption Compression
co
Plaintext
e-mail e-mail
Concatenation
conversion system
s.
Signature
Plaintext
Generation
bu
Private Key
la
yl
lls
SNMPv3 Security
w
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Encrypted
scopedP D U
scopedP D U Pr i v a c y
USM
Encryption Key Module wholeMsg
HMAC Gen.
authenticated
Au t h e n t i c a t i o n wholeMsg
Module
authKey
password
USM
authoritativeSnmpE ngin eId
Executable programs that make copies and insert them into other programs
Attacks hosts and routers
m
Attack infects boot track, compromises cpu, floods network traffic, etc.
Prevention is by identifying the pattern of the virus and implementing protection in virus
co
ch e ck ers
s.
Accounting Management bu
Least developed
Usage of resources
la
Hidden cost of IT usage (libraries)
Functional accounting
yl
Business application
lls
attributes)
w
S L A d e fi n e s
www.allsyllabus.com
vtu.allsyllabus.com www.allsyllabus.com
Negotiation of SLA
Generation of reports
SLA characteristics
Se rv i c e p a ra m et e rs
Se rv i c e l ev el s
Component parameters
Component-to-service mappings
m
co
s.
Network
bu
Attributes
la
yl
P o li c y S p a c e
lls
Do m a i n S p a c e
.a
w
P o l i c y D r iv e r Action Space
w
w
Rule Space
www.allsyllabus.com