0% found this document useful (0 votes)
9 views

Chapter 4 II

This document discusses network management and TCP/IP basics. Network management includes monitoring, testing, configuring and controlling network elements and user activity to ensure performance and security. It describes detecting failures, monitoring traffic and intrusions. TCP/IP is a suite of protocols that enables internetworking and defines addressing, routing and end-to-end communication services. The document outlines the OSI model layers and functions of the physical, data link, network and transport layers in networking.

Uploaded by

Abdurezak Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Chapter 4 II

This document discusses network management and TCP/IP basics. Network management includes monitoring, testing, configuring and controlling network elements and user activity to ensure performance and security. It describes detecting failures, monitoring traffic and intrusions. TCP/IP is a suite of protocols that enables internetworking and defines addressing, routing and end-to-end communication services. The document outlines the OSI model layers and functions of the physical, data link, network and transport layers in networking.

Uploaded by

Abdurezak Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

CHAPTER 4-II

NETWORK MANAGEMENT

1
NETWORK MANAGEMENT
 Network management is the process of managing the overall
network status , performance and the users within in the network.
 Network management includes the deployment, integration and
coordination of the hardware, software, and human elements to
monitor, test, poll, configure, analyze, evaluate, and control the
network.
 It checks the element resources to meet the real-time operational
performance, and Quality of Service requirements at a reasonable
cost.
2
CONT …
 The role of management is to secure conditions necessary for a
system’s components to be able to carry out their function and
monitor (control) every detail of a system..
 Network Management Cases: Detecting failure of an/a

 Interface Card,
 Host monitoring,
 Traffic monitoring,
 Routing table monitoring ,
 Intrusion detection

3
NETWORK MANAGEMENT TECHNOLOGIES

 The ability to read information about the performance of


network hardware via the network itself is an attractive idea.
 It helps to look at a router in the org, some miles away and
immediately see the load statistics, or the number of rejected
packets it has seen; or perhaps the status of all printers on a subnet.
 That would be useful diagnostic information. Similar information
could be obtained about software systems on any host.
 Network administration is an engineering activity that concerns
the operational management of human-computer systems.
4
ISO NETWORK MANAGEMENT MODEL
 Performance management: used to quantify, measure,
report, analyze, and control performance of network devices.
 Performance also covers capacity planning, availability, response
times, accuracy and throughput.
 Fault management used to log, detect, and respond to fault
conditions.
 Fault management also includes events, alarms, problem
identification, troubleshooting, diagnosis and fault logging.

5
CONT…

 Configuration management track devices for hardware and


software configurations.
 Configuration management is taken to include issues such as
change control, hardware inventory mapping, software inventories
and customization of systems.
 Accounting management used to specify, log, and control user and
device access.
 Accounting includes asset management, cost controls and payment
for services.
6
TCP/IP BASICS
 In 1969 the Advanced Research Projects Agency (ARPA) funded a
research and development project to create an experimental
packet- switching network.
 This network, called the ARPANET, was built to study techniques for
providing robust, reliable, vendor-independent data communications.
 Many techniques of modern data communications were developed in
the ARPANET.

7
TCP/IP BASICS
 The experimental ARPANET was so successful that many of
the organizations attached to it began to use it for daily data
communications.
 The basic TCP/IP protocols were developed after the ARPANET
was operational.
 The TCP/IP protocols were adopted as Military Standards (MIL
STD) in 1983, and all hosts connected to the network were
required to convert to the new protocols.
 TCP/IP was adopted as a standard, the term Internet came
into common usage.
8

 In 1983, the old ARPANET was divided into MILNET.


TCP/IP FEATURES
 Open protocol standards, freely available and developed
independently from any specific computer hardware or
operating system.
 Independence from specific physical network hardware. This
allows TCP/IP to integrate many different kinds of networks.
 A common addressing scheme that allows any TCP/IP device to
uniquely address any other device in the entire network, even if the
network is as large as the worldwide Internet.
 Standardized high-level protocols for consistent, widely available
user services. 9
TCP/IP
 Is a suite of protocols named after the two most important
protocols TCP and IP.
 Generally, TCP/IP (Transmission Control Protocol/Internet
Protocol) is described using four functional layers.
 Application Layer consists of applications and processes that
use
the network.
 Host-to-host transport layer provides end-to-end data
delivery services.
 Internetwork layer defines the datagram and handles the
routing of data.
11
 Network
networks.access layer consists of routines for accessing
physical
OSI Reference Model TCP/IP Protocol

Application Layer

Presentation Layer Application Layer

Session Layer

Transport Layer Transport Layer

Network Layer Internet Layer

Data Link Layer Network Access


Layer
Physical Layer
11
PURPOSE OF THE PHYSICAL LAYER
 The OSI Physical layer provides the means to transport the bits
that make up the Data Link frame across the network media.
 Creates the electrical, optical or microwave signal that
represents the bits in each frame.

Protocol Data Unit Protocol Data Unit

12
PURPOSE O F DATA LINK LAYER
 The data link layer is responsible for the exchange of frames
between nodes over a physical network media.
 It allows the upper layers to access the media and controls how
data is placed and received on the media.
 Specifically the data link layer performs these two basic services:

 It accepts Layer 3 packets and packages them into data units


called
frames.
 It controls media access control and performs error detection.13
DATA LINK LAYER
The data link layer is actually divided into two sub layers:
 Logical Link Control (LLC): This upper sub layer defines the
software processes that provide services to the network layer
protocols.
 Media Access Control (MAC): This lower sub layer defines
the
media access processes performed by the hardware.

14
THE NETWORK LAYER

The network layer uses four basic processes:


 Addressing end devices
 Encapsulation
 Routing
 De-encapsulating

15
C O N T…
 Addressing end devices - In the same way that a phone has a unique
telephone number, end devices must be configured with a unique IP
address for identification on the network.
 An end device with a configured IP address is referred to as a
HOST.
 Encapsulation - The network layer receives a Protocol Data Unit
(PDU) from the transport layer.
 In a process called encapsulation, the network layer adds IP
header information, such as the IP address of the source (sending)
and destination (receiving) hosts.
 packet.
After header information is added to the PDU, the PDU is called a
17
CO N T…
 Routing - The network layer provides services to direct packets to
a destination host on another network.
 To travel to other networks, the packet must be processed by a
router.
 The role of the router is to select paths for and direct packets
toward the destination host in a process known as routing.
 A packet may cross many intermediary devices before reaching
the destination host.
 Each route the packet takes to reach the destination host is called a
hop.
17
CO N T…
 De-encapsulation - When the packet arrives at the network layer of
the destination host, the host checks the IP header of the packet.
 If the destination IP address within the header matches its own
IP address, the IP header is removed from the packet.
 This process of removing headers from lower layers is known as de-
encapsulation.
 After the packet is de-encapsulated by the network layer, the
resulting Layer for PDU is passed up to the appropriate service at
the transport layer.

18
NETWORK LAYER PROTOCOLS

Common Network Layer Protocols


 Internet Protocol version 4 (IPv4)
 Internet Protocol version 6 (IPv6)

19
ROLE OF THE TRANSPORT LAYER
 The Transport Layer is responsible for establishing a temporary
communication session between two applications and delivering
data between them.

TCP/IP uses two protocols to achieve this:


 Transmission Control Protocol (TCP)
 User Datagram Protocol (UDP)

Primary Responsibilities of Transport layer Protocols


 Tracking the individual communication between applications on
the
source and destination hosts.
 Segmenting data for
data into streams manageability
of application dataand reassembling segmented
at the
destination.
 Identifying the proper application for each communication
APPLICATIONS THAT USE TCP
APPLICATIONS THAT USE UDP
PRESENTATION AND SESSION LAYERS

Presentation layer has three primary functions:

 Coding and conversion of application layer data.


 Compression of the data.
 Encryption of the data for transmission and the decryption
of data upon receipt by the destination.

Session Layer
 Functions create and maintain dialogs between source
and destination applications.
 Handles the exchange of information to initiate dialogs,
keep them active, and to restart sessions.
24
APPLICATION LAYER

 The application layer is the top layer of both the OSI and
TCP/IP models.

 It is the layer that provides the interface between the applications


we use to communicate and the underlying network over which
our messages are transmitted.

 Application layer protocols are used to exchange data between


programs
running on the source and destination hosts. 25
TCP/IP APPLICATION LAYER PROTOCOLS
 Domain Name Service Protocol (DNS) - used to resolve Internet names to
IP addresses.
 Telnet - a terminal emulation protocol used to provide remote access to servers
and networking devices.
 Bootstrap Protocol (BOOTP) - a precursor to the DHCP protocol, a network
protocol used to obtain IP address information during bootup.
 Dynamic Host Control Protocol (DHCP) - used to assign an IP address,
subnet mask, default gateway and DNS server to a host.
 Hypertext Transfer Protocol (HTTP) - used to transfer files that make up the
Web pages of the World Wide Web.
 File Transfer Protocol (FTP) - used for interactive file transfer
between systems.
 Trivial File Transfer Protocol (TFTP) - used for connectionless active
file
transfer.
 Simple Mail Transfer Protocol (SMTP) - used for the transfer of
mail messages and attachments.
 remote server.
Post Office Protocol (POP) - used by email clients to retrieve email 26

 Internet
from a Message Access Protocol (IMAP) – another protocol for
email
TCP/IP PROTOCOL SUITE

27
FRAME, DATAGRAM, SEGMENT, PACKET

 We can get different names for packets at different layers


 Ethernet (link layer) frame
 IP (network layer) datagram/packet
 TCP (transport layer) segment
 Terminology is not strictly followed
 we often just use the term “packet” at any layer

28
TCP/IP TROUBLESHOOTING: PING,
TRACEROUTE, IFCONFIG, NETSTAT, IPCONFIG
 Network administrators make use of a variety of commands like
ping, traceroute and netstat commands for simple diagnostics
and testing .
 Ping: command used to Test Network Connectivity.
 Indicates whether a remote host can be reached.
 Ping also displays statistics about packet loss and delivery
time.
 The Linux ping command will send continuous pings, once a
second, until stopped with a Ctrl-C.
 Here is an example
192.168.1.100 of a successful ping to the server abcd host 29
at
 Potential Uses PING
 Is system online?
 Through response
 Gather name information
 Through DNS
 Estimate relative physical location
 Based on RTT (Round Trip Time) given in summary
statistics
 Identify operating system
 Based on TTL (packet Time To Live) on each packet
line
 TTL = number of hops allowed to get to system
 64 is Linux default, 128 is Windows default (but can be
changed!)
 Notes
 Uses ICMP packets
 Oftenping
 Usage: blocked on many hosts
system 30
 E.g. ping ftp.redhat.com
 E.g. ping localhost
IFCONFIG
 Ifconfig Provides information about the basic configuration of the
interface.
 It is useful for detecting bad IP addresses, incorrect subnet
masks, and improper broadcast addresses.
 ifconfig checks the network interface configuration.
 Use this command to verify the user's configuration if the user's
system has been recently configured, or if the user's system cannot
reach the remote host while other systems on the same network
can.
 This tool is provided with the UNIX operating system 31
CONT...
 Configure network interface
 Tells current IP numbers for host system
 Usage: ifconfig
 E.g. ifconfig // command alone: display status
eth0 Link encap: Ethernet
HWaddr 00:0C:29:CD:F6:D3
inet addr: 192.168.172.128 ...
lo Link encap: Local
Loopback
inet addr: 127.0.0.1 ... 32
TRACEROUTE
 Traceroute Prints information about each routing hop that packets
take going from your system to a remote system.
 Potential Uses
 Determine physical location of machine
 Gather network information (gateway, other internal systems)
 Find system that’s dropping your packets – evidence of a
firewall
 Notes
 Can use UDP or ICMP packets
 Results often limited by firewalls
 Usage: traceroute system
 E.g. traceroute cs.umn.edu
33
CONT…
 Nslookup: Provides information about the DNS name service.
 Dig: Also provides information about name service, and is similar
to nslookup
 Netstat: Provides a variety of information.
 It is commonly used to display detailed statistics about each
network interface, network sockets, and the network routing
table
 Arp: Provides information about Ethernet/IP address translation.
 It can be used to detect systems on the local network that
are configured with the wrong IP address
34
QUIZ 1 10% ,10 MINUTE

1. What is the difference between TCP and UDP protocol?(2pts)


2. Which layer support end to end connectivity between two
hosts?(1pts)
3. List three protocol on application layers?(2pts)
4. Write one, layer three device in networking and describe its
function briefly?(2pt)
5. Which command is useful for detecting bad IP addresses, incorrect
subnet masks, and improper broadcast addresses?(2pt)
6. What is encapsulation and de-encapsulation?
35

You might also like