BIT3204 NETWORK MANAGEMENT notes
BIT3204 NETWORK MANAGEMENT notes
TCP/IP Protocol
TCP/IP is responsible for a wide range of activity: it interfaces with hardware, route
data to appropriate nodes, provides error control, and much more.
The developers of TCP/IP designed a modular protocol stack- meaning that the
TCP/IP system was divided into separate components or layers. But why use a modular
design? Not only does it aid in the education process, but it also lets manufacturers easily
adapt to specific hardware and operating system needs.
For example- if we had a token ring network and an extended star network, we surely
wouldn‘t want to create entirely different network software builds for each one.
Instead, we can just edit the network layer, called the Network Access Layer, to allow
compatibility. Not only does this benefit manufacturers, but it greatly aids networking
students in education. The TCP/IP suite is divided into four layers. Network Access Layer –
The Network Access Layer is fairly self explanatory- it interfaces with the physical
network. It formats data and addresses data for subnets, based on physical hardware
addresses. More importantly, it provides error control for data delivered on the physical
network.
Internet Layer – The Internet Layer provides logical addressing. More specifically,
the internet layer relates physical addresses from the network access layer to logical
addresses. This can be an IP address, for instance. This is vital for passing along information
to subnets that aren‘t on the same network as other parts of the network. This layer
also provides routing that may reduce traffic, and supports delivery across an internetwork.
(An internetwork is simply a greater network of LANs, perhaps a large company or
organization.)
Transport Layer – The Transport Layer provides flow control, error control, and serves as
an interface for network applications. An example of the transport layer
would be Transmission Control Protocol (TCP) - a protocol suite that is connection-
oriented. We may also use UDP- a connectionless means of transporting data.
Application Layer – Lastly, we have the Application Layer. We use this layer for
troubleshooting, file transfer, internet activities, and a slew of other activities. This layer
interacts with many types of applications, such as a database manager, email program, or
Telnet.
The Open System Interconnection Model, more commonly known as simply OSI, is another
model that can help break the TCP/IP suite into modules. Technically speaking, it is exactly
the same as the TCP/IP model, except that it has more layers. This is currently being
pushed by Cisco since it aids in learning the TCP/IP stack in an easier manner.
Physical Layer – They Physical Layer converts data into streams of electric or analog
pulses- commonly referred to as ―1‘s and 0‘s.‖ Data is broke down into simple
electric pulses, and rebuilt at the receiving end.
Data Link Layer – The Data Link layer provides an interface with the network adapter,
and can also perform basic error checking. It also maintains logical links for subnets, so
that subnets can communicate with other parts of the network without problem.
Network Layer – Much like the Transport Layer of the TCP/IP model, the Network Layer
simply supports logical addressing and routing. The IP protocol operates on the Network
Layer.
Transport Layer – Since we left out the error and flow control in the Network Layer, we
introduce it into the Transport Layer. The Transport Layer is responsible for keeping a
reliable end-to-end connection for the network.
Presentation Layer – The Presentation Layer translates data into a standard format,
while also being able to provide encryption and data compression. Encryption or data
compression does not have to be done at the Presentation Layer, although it is
commonly performed in this layer.
Application Layer – The Application Layer provides a network interface for applications
and supports network applications. This is where many protocols such as FTP, SMTP,
POP3, and many others operate. Telnet can be used at this layer to send a ping request- if it
is successful, it means that each layer of the OSI model should be functioning properly.
NETWORK PLANNING
1. Gathering Requirements
Every organization has unique needs for which they would require a network.
There are several factors to consider when gathering requirements:
Identify the nature and volume of data and how it is used within and
outside the organization.
Determine how the network will be used and by whom which often
dictates the topology you use.
Location of data with respect to users is also critical here.
Decide the types of devices for interconnecting computers and sites
The type and usage level of network resources dictates how many servers you
need and where to place servers.
Selecting a topology
Most new network designs come down to only one choice: How fast should the network be?
This will be guided by the needs identified earlier, in particular the location of sites,
volume of data and nature of existing equipment and consideration for future
expansion.
In most cases the physical topology will almost certainly be a star, and the logical topology
is almost always switching.
Ethernet switches are typically used on a LAN, but you might consider other logical
topologies for reasons such as:
Use of legacy equipment – such as token ring
3. Capacity Planning
Capacity planning involves trying to determine the amount of network
bandwidth necessary to support an application or a set of applications.
A number of techniques exist for performing capacity planning, including
linear projection, computer simulation, benchmarking, and analytical
modeling.
4. Creating a Baseline
Involves the measurement and recording of a network‘s state of
operation over a given period of time.
A baseline can be used to determine current network performance and to
help determine future network needs.
Baseline studies should be ongoing projects, and not something started and stopped
every so many years.
To perform a baseline study, you should:
List all network applications, including the number, type and utilization level.
Create a fairly extensive list of statistics to help meet your goals. These
statistics can include average network utilization, peak network utilization,
average frame size, peak frame size, average frames per second, peak frames per
second, total network collisions, network collisions per second, total runts, total
jabbers, total CRC errors, and nodes with highest percentage of utilization.
Analysis
Management Design
Simulation/
Prototyping
Monitoring
Implementation
1. Analyze requirements
A network cannot very well provide effective solutions to problems that have not been
clearly defined in objective terms.
To attempt to implement networks before everyone agrees to (buy-in) the exact nature
of the problem to be solved is somewhat akin to hitting a moving target.
The network will never satisfy all constituencies‘ needs because no one agreed
what those needs were in the first place.
All network development efforts start with a problem as perceived by someone, be
they management or end-users.
At some point, management agrees that a problem exists that is worth expending
resources to at least investigate.
The responsibility for conducting the investigation may be given to in-house
personnel or to an outside consultant or facilitator.
Interviews with users and technical personnel
4. Types of Application
12
An example of this is the IP address 172.16.3.14. In this example the 172.16 is the
network number and the 3.14 is the host number.
The split into network number and host number is determined by the class of
the IP address.
Class A addresses
Have the first bit set to 0.
The next 7 bits are used for the network number. This gives a possibility
7
of 128 networks (2 ).
However, it should be noted that there are two cases, the all bits 0 number
and the all bits 1 number, which have special significance in classes A, B
and C.
The remaining 24 bits of a Class A address are used for the host number.
Once again, the two special cases apply to the host number part of an IP
address.
Each Class A network can therefore have a total of 16,777,214 hosts (224 -
2).
Class A addresses are assigned only to networks with very large numbers
of hosts (historically, large corporations).
An example is the 9.0.0.0 network, which is assigned to IBM.
The Class B address
is more suited to medium-sized networks.
The first two bits of the address are predefined as 10.
The next 14 bits are used for the network number and the remaining 16 bits
identify the host number.
This gives a possibility of 16,382 networks each containing up to 65,534 hosts.
The Class C address
It offers a maximum of 254 hosts per network and is therefore suited to smaller
networks.
However, with the first three bits of the address predefined to 110, the next 21 bits
provide for a maximum of 2,097,150 such networks.
The remaining classes of address, D and E, are reserved classes and have a
special meaning.
Class E addresses are reserved for future use
Class D addresses are used to address groups of hosts in a limited area.
This function is known as multicasting.
Client systems contain specialized software that allows them to request shared
resources that are controlled by server systems responding to a client request.
The NOS enhances the reach of the client PC by making remote services
available as extensions of the local native operating system.
NOSs also support multiple user accounts at the same time and enables
concurrent access to shared resources by multiple clients. A NOS server is a
multitasking system.
14
Choosing a NOS
The main features to consider when selecting a NOS include:
Performance
Security
Scalability
Robustness/fault tolerance
1. Network Management
Network management refers to the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of
networked systems.
There exists a wide variety of software and hardware products that help
network system administrators manage a network.
Network management covers a wide area, including:
Network Operations: keeping the network (and the services that the
network provides) up and running smoothly. It includes monitoring the
network to spot problems as soon as possible, ideally before users are
affected.
Administration: deals with keeping track of resources in the network and how
they are assigned.
15
Maintenance: concerned with performing repairs and upgrades.
Maintenance also involves corrective and preventive measures to make the
managed network run.
Provisioning: is concerned with configuring resources in the network to
support a given service.
We Monitor
o Available, reachable
Resources
Performance
o Round-trip-time, throughput
We Keep Track of
Statistics
o Detection of issues,
16
Ticketing systems are good at this
Expectations
A network in operation needs to be monitored in order to:
Agreements)
– Configuration Management
– Security Management
– Performance Management
– Accounting Management
Fault Management
Is the process of locating problems, or faults, on the network
Configuration Management
The configuration of certain network devices controls the behavior of the
network.
Configuration management is the process of finding and setting up
(configuring) these critical devices
18
Security Management
Performance Management
Involves measuring the performance of the network hardware, software, and media.
Examples of measured activities are:
– Overall throughput
– Percentage utilization
– Error rates
– Response time
Accounting Management
Involves tracking individual‘s utilization and grouping of network
resources to ensure that users have sufficient resources
19
Network design models
Hierarchical Models
1. Core Layer
The core layer is the network’s high-speed switching backbone that is crucial to corporate
communications.
It is also referred as the backbone.
The core layer should have the following characteristics:
20
Fast transport
High reliability
Redundancy
Fault tolerance
Low latency and good manageability
Avoidance of CPU-intensive packet manipulation caused by security, inspection,
quality of service (QoS) classification, or other processes
Limited and consistent diameter
Quality of service (QoS
When a network uses routers, the number of router hops from edge to edge is called
the diameter.
it is considered good practice to design for a consistent diameter within a hierarchical
network.
The trip from any end station to another end station across the backbone should have
the same number of hops.
The distance from any end station to a server on the backbone should also be
consistent.
Limiting the internetwork’s diameter provides predictable performance and ease of
troubleshooting.
You can add distribution layer routers and client LANs to the hierarchical
modelwithout increasing the core layer’s diameter. Use of a block implementation
isolates existing end stations from most effects of network growth.
2. Distribution Layer
The network’s distribution layer is the isolation point between the network’s access
and core layers.
The distribution layer can have many roles, including implementing the following
functions:
21
Broadcast or multicast domain definition
Routing between virtual LANs (VLANs)
Media translations (for example, between Ethernet and Token Ring)
Redistribution between routing domains (for example, between two different
routing protocols)
Demarcation between static and dynamic routing protocols
You can use several Cisco IOS Software features to implement policy at the distribution
layer:
In the campus LANs, the distribution layer provides routing between VLANs
that also apply security and Quality of service policies.
3. Access Layer
The access layer provides user access to local segments on the network.
The access layer is characterized by switched LAN segments in a campus
environment.
Micro segmentation using LAN switches provides high bandwidth to workgroups by
reducing the number of devices on Ethernet segments.
Functions of the access layer include the following:
Layer 2 switching
High availability
Port security
Broadcast suppression
QoS classification and marking and trust boundaries
Rate limiting/policing
Address Resolution Protocol (ARP) inspection
Virtual access control lists (VACLs)
Spanning tree
Trust classification
22
Power over Ethernet (PoE) and auxiliary VLANs for VoIP
Network Access Control (NAC)
Auxiliary VLANs
Redundancy Model
NOTE
23
Because redundancy is expensive to deploy and maintain, you should implement
redundant topologies with care. Be sure to select a level of redundancy that matches
your customer's requirements for availability and affordability.
Before you select redundant design solutions, you should first analyze the business
and technical goals of your customer.
Make sure you can identify critical applications, systems, internetworking devices,
and links.
Analyze your customer's tolerance for risk and the consequences of not
implementing redundancy.
Make sure to discuss with your customer the tradeoffs of redundancy versus low
cost, and simplicity versus complexity.
Redundancy adds complexity to the network topology and to network addressing
and routing.
Secure Models
When we send our data from source side to destination side we have to use some transfer
method like the internet or any other communication channel by which we are able to
send our message.
The two parties, who are the principals in this transaction, must cooperate for the
exchange to take place.
When the transfer of data happened from one source to another source some logical
information channel is established between them by defining a route through the
internet from source to destination and by the cooperative use of communication
protocols (e.g., TCP/IP) by the two principals.
When we use the protocol for this logical information channel the main aspect
security has come.
All the technique for providing security have to components:
This model shows that there are four basic tasks in designing a particular security
service:
24
Design an algorithm for performing the security-related transformation.
Generate the secret information to be used with the algorithm.
Develop methods for the distribution and sharing of secret information.
Specify a protocol to be used by the two principals that make use of the security
algorithm and the secret information to achieve a particular security service.
Creation of well thought-out network security model will effectively help you in
realization your network's security.
The network security model (NSM) is a scheme that reflects the general plan and the
policy of ensuring the network security, and usually includes all or some of the following
seven layers in different modifications according to the specific company's needs:
Physical layer — involves organization of physical security against the access to the
data on computer devices, this can be access control devices, cameras, alarm.
VLAN layer — involves creation of Virtual Local Area Networks (VLANs) which
join together common hosts for security purposes.
ACL layer — supposes creation and maintenance of Access Control Lists (ACLs)
which allow or deny the access between hosts on different networks.
Software layer — helps to protect the user layer and ensures the software's actuality.
User layer — involves the user’s training of security on the network.
Administrative layer — supposes the training of administrative users.
IT department layer — this layer is the most important for network security, it contains
all network security professionals and support specialists, network technicians and
architects, which organize and maintain the work of the network and hosts.
LAN technologies
Ethernet
Ethernet is a widely deployed LAN technology.
Ethernet shares media.
25
Network which uses shared media has high probability of data collision.
Ethernet uses Carrier Sense Multi Access/Collision Detection (CSMA/CD)
technology to detect collisions.
On the occurrence of collision in Ethernet, all its hosts roll back, wait for some
random amount of time, and then re-transmit the data.
Ethernet connector is network interface card equipped with 48-bits MAC address.
This helps other Ethernet devices to identify and communicate with remote devices in
Ethernet.
Traditional Ethernet uses 10BASE-T specifications. The number 10 depicts 10MBPS
speed, BASE stands for baseband, and T stands for Thick Ethernet.
10BASE-T Ethernet provides transmission speed up to 10MBPS and uses coaxial
cable or Cat-5 twisted pair cable with RJ-5 connector.
Ethernet follows Star topology with segment length up to 100 meters.
All devices are connected to a hub/switch in a star fashion.
Fast-Ethernet
To encompass need of fast emerging software and hardware technologies, Ethernet
extends itself as Fast-Ethernet.
It can run on UTP, Optical Fiber, and wirelessly too.
It can provide speed up to 100MBPS.
This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable.
It uses CSMA/CD technique for wired media sharing among the Ethernet hosts and
CSMA/CA (CA stands for Collision Avoidance) technique for wireless Ethernet LAN.
Fast Ethernet on fiber is defined under 100BASE-FX standard which provides speed up
to 100MBPS on fiber.
Ethernet over fiber can be extended up to 100 meters in half-duplex mode and can
reach maximum of 2000 meters in full-duplex over multimode fibers.
26
6. Giga-Ethernet
Fast-Ethernet retained its high speed status only for three years till Giga-Ethernet
introduced.
Giga-Ethernet provides speed up to 1000 mega bits/seconds.
IEEE802.3ab standardizes Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6
cables.
IEEE802.3ah defines Giga-Ethernet over Fiber
7. Virtual LAN
Virtual LAN is a solution to divide a single Broadcast domain into multiple Broadcast
domains.
Host in one VLAN cannot speak to a host in another. By default, all hosts are placed into
the same VLAN.
27
In this diagram, different VLANs are depicted in different color codes.
Hosts in one VLAN, even if connected on the same Switch cannot see or speak to other
hosts in different VLANs. VLAN is Layer-2 technology, which works closely on
Ethernet.
To route packets between two different VLANs, a Layer-3 device such as Router is
required.
28
Types of CSMA Protocols:
1. Persistent CSMA
In this method, station that wants to transmit data continuously senses the
channel to check whether the channel is idle or busy.
When the station detects an idle-channel, it immediately transmits the frame with
probability 1. Hence it is called I-persistent CSMA.
This method has the highest chance of collision because two or more stations may
find channel to be idle at the same time and transmit their frames.
When the collision occurs, the stations wait a random amount of time and start all
over again.
Advantages:
Due to carrier sense property 1-persistent CSMA gives better performance than the
ALOHA systems.
Disadvantages:
Propagation Delay
2. Non-Persistent CSMA
In this scheme, if a station wants to transmit a frame and it finds that the channel is
busy (some other station is transmitting) then it will wait for fixed interval of time.
After this time, it again checks the status of the channel and if the channel is free it
will transmit.
A station that has a frame to send senses the channel.
29
If the channel is busy, it waits a random amount of time and then senses the
channel again.
In non-persistent CSMA the station does not continuously sense the channel for the
purpose of capturing it when it detects the end of previous transmission.
Advantages:
Disadvantages:
It reduces the efficiency of network because the channel remains idle and it
leads to longer delays than 1-persistent CSMA.
3. P-Persistent CSMA
4. CSMA/CD
Working:
If two stations sense the channel to be idle they begin transmitting simultaneously
and cause a collision.
A collision is indicated by a high voltage.
Both the stations monitor the channel for a collision and stop transmitting as soon
as a collision is detected.
30
Now the stations wait for a random amount of time and check if channel is free.
Network security
It is typically a combination of both hardware and software measures that protects against
the following:
Unauthorized Access: this measure ensures that only those with authorization gain access
to the network. An example is the credentials you must enter when logging into your
computer network.
32
Malicious Use: this measure manifests itself in a number of ways. The most common is
that high value network resources are locked away from public access. An example is
your company's computer room.
Faults: this measure is concerned with detecting and preventing potential issues when and
before they occur. An example is the temperature sensors in the computers and devices
that supply information on the operational state.
Tampering: this measure monitors when devices are accessed, or when cases are opened
to determine when something might have happened that shouldn't. An example is when
credentials are used for access to the resource.
Destruction: this measure is similar to malicious use, and works primarily in a
preventative capacity. An example is the company's computer room, as mentioned above.
Disclosure: this measure focuses on keeping the particulars of the network secret, so that
exploits cannot be easily developed. An example is keeping the specifications under lock
and key so that only those that need to know the particulars have access to them.
Is the process of designing a network so that it includes measures that prevent the problems
mentioned in the previous sections.
Developing security strategies that can protect all parts of a complicated network
while having a limited effect on ease of use and performance is one of the most
important and difficult tasks related to network design.
Security design is challenged by the complexity and absorbent nature of modern
networks that include public servers for electronic commerce, extranet connections for
business partners, and remote-access services for users reaching the network from home,
customer sites, hotel rooms, Internet cafes, and so on.
To help you handle the difficulties inherent in designing network security for complex
networks, one needs to focus on planning and policy development before the selection of
security products.
Security should be considered during many steps of network design process.
The following steps will help you effectively plan and execute a security strategy
Identifying network assets and the risk that those assets could be sabotaged or
inappropriately accessed.
It also involves analyzing the consequences of risks.
33
Network assets can include network hosts (hosts' operating systems, applications, and
data), internetworking devices (such as routers and switches), and network data that
traverses the network.
Network assets may also include intellectual property, trade secrets, and a company's
reputation.
Risks can range from hostile intruders to untrained users who download Internet
applications that have viruses.
Hostile intruders can steal data, change data, and cause service to be denied to
legitimate users.
Denial-of-service (DoS) attacks have become increasingly common to day.
Although many customers have more specific goals, in general, security requirements
boil down to the need to protect the following assets:
The confidentiality of data, so that only authorized users can view sensitive information
The integrity of data, so that only authorized users can change sensitive information
System and data availability, so that users have uninterrupted access to important
computing resources
As is the case with most technical design requirements, achieving security goals
means making tradeoffs.
Tradeoffs must be made between security goals and goals for affordability,
usability, performance, and availability.
Also, security adds to the amount of management work because user login IDs,
passwords, and audit logs must be maintained.
Security also affects network performance. Security features such as packet filters
and data encryption consume CPU power and memory on hosts, routers, and
servers.
Example : Encryption can use upward of 15 percent of available CPU power on a router
or server. Encryption can be implemented on dedicated appliances instead of on shared
routers or servers, but there is still an effect on network performance because of the
delay that packets experience while they are being encrypted or decrypted.
Another tradeoff is that security can reduce network redundancy. If all traffic must go
through an encryption device, for example, the device becomes a single point of
failure. This makes it hard to meet availability goals.
34
Security can also make it harder to offer load balancing. Some security mechanisms
require traffic to always take the same path so that security mechanisms can be
applied uniformly. For example, a mechanism that randomizes TCP sequence numbers
(so that hackers can't guess the numbers) won't work if some TCP segments for a session
take a path that bypasses the randomizing function due to load balancing.
For a security plan to be useful, it needs to have the support of all levels of employees
within the organization. It is especially important that corporate management fully
35
support the security plan. Technical staff at headquarters and remote sites should buy into
the plan, as should end users.
A security policy is a formal statement of the rules by which people who are given
access to an organization's technology and information assets must abide.
A security policy informs users, managers, and technical staff of their obligations for
protecting technology and information assets.
The policy should specify the mechanisms by which these obligations can be met.
As was the case with the security plan, the security policy should have buy-in from
employees, managers, executives, and technical personnel.
Developing a security policy is the job of senior management, with help from
security and network administrators. The administrators get input from managers,
users, network designers and engineers, and possibly legal counsel. As a network
designer, you should work closely with the security administrators to understand how
policies might affect the network design.
After a security policy has been developed, with the engagement of users, staff, and
management, it should be explained to all by top management. Many enterprises
require personnel to sign a statement indicating that they have read, understood, and
agreed to abide by a policy.
A security policy is a living document. Because organizations constantly change,
security policies should be regularly updated to reflect new business directions and
technological shifts. Risks change over time also and affect the security policy.
An access policy that defines access rights and privileges. The access policy should
provide guidelines for connecting external networks, connecting devices to a network,
and adding new software to systems. An access policy might also address how data is
categorized (for example, confidential, internal, and top secret).
An accountability policy that defines the responsibilities of users, operations staff,
and management. The accountability policy should specify an audit capability and
provide incident-handling guidelines that specify what to do and whom to contact if a
possible intrusion is detected.
An authentication policy that establishes trust through an effective password policy and
sets up guidelines for remote-location authentication.
A privacy policy that defines reasonable expectations of privacy regarding the monitoring
of electronic mail, logging of keystrokes, and access to users' files.
36
Computer-technology purchasing guidelines that specify the requirements for acquiring,
configuring, and auditing computer systems and networks for compliance with the policy.
7. Maintaining Security
37
An NMS identifies, configures, monitors, updates and troubleshoots network devices
both wired and wireless in an enterprise network.
A system management control application then displays the performance data
collected from each network component, allowing network engineers to make
changes as needed.
Network engineers use a network management system to handle a variety of
operations, among them:
Latest Tools & Software to ensure your network is continuously tracked and monitored at all times of
the day to ensure the highest up-times possible.
Most of them have free Downloads or Trials to get you started for 15 to 30 days to ensure it meets your
requirements.
1. SolarWinds Network Performance Monitor
is easy to setup and can be ready in no time.
The tool automatically discovers network devices and deploys within an hour.
Its simple approach to oversee an entire network makes it one of the easiest to use and most
intuitive user interfaces.
The product is highly customizable and the interface is easy to manage and change very quickly.
You can customize the web-based performance dashboards, charts, and views. You
can design a tailored topology for your entire network infrastructure.
You can also create customized dependency-aware intelligent alerts and much more.
38
It is one of the best choices for organizations with low experience in network
monitoring.
The user interface is really powerful and very easy to use.
A very particular feature of PRTG is its ability to monitor devices in the
datacenter with a mobile app.
A QR code that corresponds to the sensor is printed out and attached to the physical
hardware. The mobile app is used to scan the code and a summary of the device is
displayed on the mobile screen.
PRTG has a very flexible pricing plan
3. ManageEngine OpManager
5. Zabbix
39
Network management application (NMA)
is the software that sits on the network management station (NMS) and retrieves data from
management agents (MAs) for the purpose of monitoring and controlling various devices on the
network.
It is defined by the ISO/OSI network management model and its subset of protocols, namely Simple
Network Management Protocol (SNMP) and Common Management Information Protocol (CMIP)
40